commit_msg
stringlengths
1
24.2k
commit_hash
stringlengths
2
84
project
stringlengths
2
40
source
stringclasses
4 values
labels
int64
0
1
repo_url
stringlengths
26
70
commit_url
stringlengths
74
118
commit_date
stringlengths
25
25
Add documentation for CRYPTO_memcmp. Reviewed-by: Matthias St. Pierre <[email protected]> (Merged from https://github.com/openssl/openssl/pull/9225)
0ccff7a7ea82a921f780a483fc91c6b90a1378d9
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/0ccff7a7ea82a921f780a483fc91c6b90a1378d9
2019-06-24 09:18:48+10:00
Fix bug in EDDSA speed test The pkey created in one loop was being fed into the keygen of the next loop - since it was not set to NULL after the free. This meant that the 2 EVP_MD_CTX objects that still had ref counts to this key were getting confused. All other tests clear the key after freeing the key if they loop (some do this by declaring/initing the pkey inside the loop). The offending code is a recent addition to the speed app. This was found using the -async_jobs option. Similar code was tried for an RSA key using 111 which resulted in the same issue. Found while trying to test issue #128867 (It is not known if this will fix that issue yet). Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: Tim Hudson <[email protected]> (Merged from https://github.com/openssl/openssl/pull/12975)
4f5b222b84432a11c44d8c9a11c7fa98351db79b
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/4f5b222b84432a11c44d8c9a11c7fa98351db79b
2020-09-25 13:50:25+10:00
Fix spelling: adroideabi -> androideabi CLA: trivial Reviewed-by: Rich Salz <[email protected]> Reviewed-by: Ben Kaduk <[email protected]> (Merged from https://github.com/openssl/openssl/pull/5029)
bebef673607b9701bc21a0f7b7dbf92434af2588
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/bebef673607b9701bc21a0f7b7dbf92434af2588
2018-01-07 21:57:25+08:00
Drop a spurious printf in evp_test.c A spurious printf was added to evp_test.c - probably for debugging purposes. This actually causes runtime errors in some cases because the name being printed can be NULL. Fixes #19814 Reviewed-by: Hugo Landau <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/19820)
12c20c5486b6440a9b667c93f130a8fdea029b81
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/12c20c5486b6440a9b667c93f130a8fdea029b81
2022-12-02 09:27:34+00:00
Add documentation Reviewed-by: Richard Levitte <[email protected]> (Merged from https://github.com/openssl/openssl/pull/1252)
a68d8c7b77a3d46d591b89cfd0ecd2a2242e4613
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/a68d8c7b77a3d46d591b89cfd0ecd2a2242e4613
2017-01-12 12:22:12-05:00
Use the return value from write(2) This prevents a warning when building with crypto-mdebug. Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/3836)
43a0449fe6ce18b750803be8a115a412a7235496
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/43a0449fe6ce18b750803be8a115a412a7235496
2017-07-04 09:56:05+10:00
Pass correct maximum output length to provider derive operation And improve error checking in EVP_PKEY_derive* calls. Reviewed-by: Matt Caswell <[email protected]> (Merged from https://github.com/openssl/openssl/pull/13869)
6d9a54c6e661094c0668f0307213789c2d9be3ec
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/6d9a54c6e661094c0668f0307213789c2d9be3ec
2021-01-14 14:40:23+01:00
Adapt CIPHER_DEBUG to the new generic trace API Co-authored-by: Dr. Matthias St. Pierre <[email protected]> Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/8198)
77359d22c97d1636eccf1fa583dc295228835144
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/77359d22c97d1636eccf1fa583dc295228835144
2018-12-12 23:57:48+01:00
QUIC TXP: Fix bug in send stream handling, cleanup Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: Matt Caswell <[email protected]> (Merged from https://github.com/openssl/openssl/pull/19703)
05f97354bb6fe29731a8a25a475a115a2c44720a
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/05f97354bb6fe29731a8a25a475a115a2c44720a
2022-12-16 13:26:33+00:00
Replumbing: add documentation for the provider configuration module Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/8549)
b6670f690c4244e63dbc02a2ba25061f9c53945f
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/b6670f690c4244e63dbc02a2ba25061f9c53945f
2019-03-30 22:25:00+01:00
Improve testing of elliptic curve validation Add a test recipe (test/recipes/15-test_ecparams.t) which uses 'openssl ecparam' to check the test vectors. Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/2544)
691e302be3ededfcdef10c5f4c0d024ef1545b48
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/691e302be3ededfcdef10c5f4c0d024ef1545b48
2017-02-03 00:31:09+01:00
Improve readability of f_impl.c and f_impl.h Reviewed-by: Bernd Edlinger <[email protected]> (Merged from https://github.com/openssl/openssl/pull/5105)
8e32ec7a568b377f7fbcbee6b1bcf7fd8bbe2e88
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/8e32ec7a568b377f7fbcbee6b1bcf7fd8bbe2e88
2018-02-14 14:35:01+00:00
Many spelling fixes/typo's corrected. Around 138 distinct errors found and fixed; thanks! Reviewed-by: Kurt Roeckx <[email protected]> Reviewed-by: Tim Hudson <[email protected]> Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/3459)
46f4e1bec51dc96fa275c168752aa34359d9ee51
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/46f4e1bec51dc96fa275c168752aa34359d9ee51
2017-11-11 19:03:10-05:00
Fix X509_NAME decode for malloc failures. The original X509_NAME decode free code was buggy: this could result in double free or leaks if a malloc failure occurred. Simplify and fix the logic. Thanks to Guido Vranken for reporting this issue. Reviewed-by: Matt Caswell <[email protected]> (Merged from https://github.com/openssl/openssl/pull/1691)
6dcba070a94b1ead92f3e327cf207a0b7db6596f
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/6dcba070a94b1ead92f3e327cf207a0b7db6596f
2016-10-02 15:21:29+01:00
PKCS12 app: Improve readability w.r.t. enc_flag, renamed to enc_name Reviewed-by: Dmitry Belyavskiy <[email protected]> (Merged from https://github.com/openssl/openssl/pull/16416)
870871e5df4f47611c38e81d3f50e38cbf362082
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/870871e5df4f47611c38e81d3f50e38cbf362082
2021-08-24 12:27:12+02:00
OpenSSL::config: Fix trivial bugs Reviewed-by: Hugo Landau <[email protected]> Reviewed-by: Matt Caswell <[email protected]> (Merged from https://github.com/openssl/openssl/pull/19285)
2ba5bffa26c0c4677f48e730628c0b54c31c734c
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/2ba5bffa26c0c4677f48e730628c0b54c31c734c
2022-09-27 18:51:57+02:00
Fix POLICYINFO printing to not assume NUL terminated strings ASN.1 strings may not be NUL terminated. Don't assume they are. CVE-2021-3712 Reviewed-by: Viktor Dukhovni <[email protected]> Reviewed-by: Paul Dale <[email protected]> Reviewed-by: David Benjamin <[email protected]>
1747d4658b3830951068a6a6c1fa2b45c4731fb3
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/1747d4658b3830951068a6a6c1fa2b45c4731fb3
2021-08-18 12:31:38+01:00
Fix range_should_be_prefix() to actually return the correct result range_should_be_prefix() was misidentifying whether an IP address range should in fact be represented as a prefix. This was due to a bug introduced in commit 42d7d7dd which made this incorrect change: - OPENSSL_assert(memcmp(min, max, length) <= 0); + if (memcmp(min, max, length) <= 0) + return -1; This error leads to incorrect DER being encoded/accepted. Reported by Theo Buehler (@botovq) Reviewed-by: Paul Dale <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/18524)
30532e59f475e0066c030693e4d614311a9e0cae
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/30532e59f475e0066c030693e4d614311a9e0cae
2022-06-10 15:58:58+01:00
Don't free NCONF obtained values Bug reported by Michel Sales. Reviewed-by: Rich Salz <[email protected]>
ebc4815fa56b64d711ada36899a35182a99cbbdb
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/ebc4815fa56b64d711ada36899a35182a99cbbdb
2016-03-06 20:01:20-05:00
evp/e_chacha20_poly1305.c: improve performance for short TLS records. Inputs not longer than 64 bytes are processed ~10% faster, longer lengths not divisble by 64, e.g. 255, up to ~20%. Unfortunately it's impossible to measure with apps/speed.c, -aead benchmarks TLS-like call sequence, but not exact. It took specially crafted code path... Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/6597)
a091e212fc55244fe03a4c7db7d8978c5b5014cb
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/a091e212fc55244fe03a4c7db7d8978c5b5014cb
2018-06-27 12:16:52+02:00
More comments Conflicts: crypto/dsa/dsa_vrf.c crypto/ec/ec2_smpl.c crypto/ec/ecp_smpl.c Conflicts: demos/bio/saccept.c ssl/d1_clnt.c Conflicts: bugs/dggccbug.c demos/tunala/cb.c Reviewed-by: Tim Hudson <[email protected]>
23a22b4cf72b0c2aadcd65001d4a28941d570547
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/23a22b4cf72b0c2aadcd65001d4a28941d570547
2015-01-16 14:43:29+00:00
Fix bug in strncpy() use of sk_ASN1_UTF8STRING2text() in asn1_lib.c Reviewed-by: Matt Caswell <[email protected]> Reviewed-by: David von Oheimb <[email protected]> (Merged from https://github.com/openssl/openssl/pull/11300)
b4ba2b7ce0933bede5d3b59a5abbde8fa3de2228
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/b4ba2b7ce0933bede5d3b59a5abbde8fa3de2228
2020-03-20 15:15:34+01:00
Fix possible null pointer dereference of evp_pkey_get_legacy() evp_pkey_get_legacy() will return NULL on failure, however several uses of it or its wrappers does not check the return value of evp_pkey_get_legacy(), which could lead to NULL pointer dereference. Fix those possible bugs by adding NULL checking. Reviewed-by: Shane Lontis <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/17967)
b9a86d5dd8b5bd33be42390bcbb5121fe0ae71a1
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/b9a86d5dd8b5bd33be42390bcbb5121fe0ae71a1
2022-03-25 20:28:32+08:00
Fix bug in err_string_data_cmp Unsigned overflow. Thanks to Brian Carpenter for reporting this. Reviewed-by: Tim Hudson <[email protected]> (Merged from https://github.com/openssl/openssl/pull/3887)
c784a838e0947fcca761ee62def7d077dc06d37f
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/c784a838e0947fcca761ee62def7d077dc06d37f
2017-07-08 12:43:55-04:00
evp_rand: fix bug in gettable_ctx/settable_ctx calls Reviewed-by: Matt Caswell <[email protected]> (Merged from https://github.com/openssl/openssl/pull/12931)
d8e52fd05e350ee308715c46ac13dbea2899a6ce
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/d8e52fd05e350ee308715c46ac13dbea2899a6ce
2020-09-22 08:29:58+10:00
bn/asm/x86_64-mont5.pl: fix carry propagating bug (CVE-2015-3193). Reviewed-by: Richard Levitte <[email protected]>
29851264f11ccc70c6c0140d7e3d8d93ef5c9b11
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/29851264f11ccc70c6c0140d7e3d8d93ef5c9b11
2015-12-01 09:00:32+01:00
QUIC MSST: Add documentation for new APIs Reviewed-by: Matt Caswell <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/20765)
1e4a9d882f77977f518dcad418b05822efb172fe
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/1e4a9d882f77977f518dcad418b05822efb172fe
2023-04-18 19:30:56+01:00
Small fixup, an extra line slipped in The previous 'Relax the requirements for a debug build' commit had an extra line of code that shouldn't have been there. This fixes it. Reviewed-by: Viktor Dukhovni <[email protected]>
1de8e63f86e1f1a60961489c47be55bb5f03e8d7
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/1de8e63f86e1f1a60961489c47be55bb5f03e8d7
2016-01-14 22:05:09+01:00
Remove SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER and SSL_OP_TLS_D5_BUG support. Suggested by David Benjamin Reviewed-by: Rich Salz <[email protected]> Reviewed-by: Viktor Dukhovni <[email protected]> MR: #1520
1c9ed1d8a715e70c5e0d8c08f3a47e1a6fa9fd89
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/1c9ed1d8a715e70c5e0d8c08f3a47e1a6fa9fd89
2015-12-22 13:48:01+01:00
aes/asm/bsaes-armv7: fix kernel-side XTS and harmonize with Linux. XTS bug spotted and fix suggested by Adrian Kotelba. Reviewed-by: Tim Hudson <[email protected]>
e620e5ae37bc3fc5e457ebf3edcdd01b20f8c5dd
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/e620e5ae37bc3fc5e457ebf3edcdd01b20f8c5dd
2015-02-24 10:07:22+01:00
Fix broken links, mainly typo's Also tweak find-doc-nits while fixing a bug (don't need .in files) Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: Richard Levitte <[email protected]> (Merged from https://github.com/openssl/openssl/pull/10239)
1b0d1bf7f177f1a0c979af8e4abbd6ed45d464d7
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/1b0d1bf7f177f1a0c979af8e4abbd6ed45d464d7
2019-10-05 14:03:57-04:00
Fix another build break for no-mem-debug Reviewed-by: Richard Levitte <[email protected]>
7b0a09f9cc169647d93cc2a38c7274684e35f723
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/7b0a09f9cc169647d93cc2a38c7274684e35f723
2016-01-07 16:16:22-05:00
Find debug- targets that can be combined with their non-debug counterparts and do so Reviewed-by: Andy Polyakov <[email protected]>
7910044064e106073c097a6940d25fe36401266b
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/7910044064e106073c097a6940d25fe36401266b
2015-03-12 14:55:05+01:00
Add SSL tests for certificates with embedded SCTs The only SSL tests prior to this tested using certificates with no embedded Signed Certificate Timestamps (SCTs), which meant they couldn't confirm whether Certificate Transparency checks in "strict" mode were working. These tests reveal a bug in the validation of SCT timestamps, which is fixed by the next commit. Reviewed-by: Rich Salz <[email protected]> Reviewed-by: Andy Polyakov <[email protected]> Reviewed-by: Richard Levitte <[email protected]> (Merged from https://github.com/openssl/openssl/pull/3138)
2094ea070a1fb6aa06b8e939e6cb735edc2c178b
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/2094ea070a1fb6aa06b8e939e6cb735edc2c178b
2017-04-06 13:21:27+01:00
Also change the non-debug versions to use size_t Reviewed-by: Richard Levitte <[email protected]> MR: #1518
f5d97098a4c5d1c91887a3f2e0a31c1e20ca32e3
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/f5d97098a4c5d1c91887a3f2e0a31c1e20ca32e3
2015-12-22 11:26:39+01:00
bugfix in apps/cmp.c and cmp_client.c: inconsistencies on retrieving extraCerts in code and doc Reviewed-by: Tim Hudson <[email protected]> (Merged from https://github.com/openssl/openssl/pull/12822)
bb30bce22b1f1e0dd6e3e33f28ddb24dc5b285ab
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/bb30bce22b1f1e0dd6e3e33f28ddb24dc5b285ab
2020-09-08 15:30:33+02:00
Run-checker merge CI: Memleak test does not work without ubsan Reviewed-by: Paul Dale <[email protected]> Reviewed-by: Hugo Landau <[email protected]> (Merged from https://github.com/openssl/openssl/pull/19874)
1ca61aa56090356bbdbb16cf48916fbd9886c78d
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/1ca61aa56090356bbdbb16cf48916fbd9886c78d
2022-12-09 12:13:36+01:00
apps/cmp.c: Improve documentation of -extracerts, -untrusted, and -otherpass Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/12825)
7a7d6b514fb2c95570896e512e165a38c9ecac46
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/7a7d6b514fb2c95570896e512e165a38c9ecac46
2020-08-28 14:55:38+02:00
Fix bug in scrypt KDF provider dup method The scrypt KDF provider's dup method calls kdf_scrypt_new passing a libctx, but a provider context is expected. Since the provider context is passed as void *, this was not caught. Reviewed-by: Matt Caswell <[email protected]> Reviewed-by: Paul Dale <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/17873)
e04c2c02e8e6b9ec71d93c26c14167ceb2165ce8
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/e04c2c02e8e6b9ec71d93c26c14167ceb2165ce8
2022-03-11 14:02:39+00:00
spelling fixes, just comments and readme. Reviewed-by: Matt Caswell <[email protected]> Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/1413)
6025001707fd65679d758c877200469d4e72ea88
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/6025001707fd65679d758c877200469d4e72ea88
2016-08-05 19:56:58+02:00
unify spelling of serialize Reviewed-by: Matt Caswell <[email protected]> (Merged from https://github.com/openssl/openssl/pull/12104)
aa97970c1a69ae15b4191aa58cdb56e016f15922
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/aa97970c1a69ae15b4191aa58cdb56e016f15922
2020-06-11 09:42:34+10:00
Fix CVE-2022-3786 in punycode decoder. Fixed the ossl_a2ulabel() function which also contained a potential buffer overflow, albeit without control of the contents. This overflow could result in a crash (causing a denial of service). The function also did not NUL-terminate the output in some cases. The two issues fixed here were dentified and reported by Viktor Dukhovni while researching CVE-2022-3602. Reviewed-by: Matt Caswell <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> (cherry picked from commit c42165b5706e42f67ef8ef4c351a9a4c5d21639a)
680e65b94c916af259bfdc2e25f1ab6e0c7a97d6
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/680e65b94c916af259bfdc2e25f1ab6e0c7a97d6
2022-10-27 10:22:47+11:00
Avoid negative array index in BIO_debug_callback() BIO_snprintf() can return -1 on truncation (and overflow as of commit 9cb177301fdab492e4cfef376b28339afe3ef663). Though neither can realistically occur while printing a pointer and short fixed string into a buffer of length 256, the analysis to confirm that this the case goes somewhat far up the call chain, and not all static analyzers can successfully follow the chain of logic. It's easy enough to clamp the returned length to be nonnegative before continuing, which appeases the static analyzer and does not harm the subsequent code. Reviewed-by: Richard Levitte <[email protected]> Reviewed-by: Rich Salz <[email protected]>
a1673e1536729d49cb758b988ac7be368e9b1fdb
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/a1673e1536729d49cb758b988ac7be368e9b1fdb
2016-03-08 16:44:57-06:00
Fix faulty check of padding in x_long.c Bug uncovered by test [extended tests] Reviewed-by: Matt Caswell <[email protected]> (Merged from https://github.com/openssl/openssl/pull/3088)
79b3452faf04f2572f57eb37b618cc603d9983da
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/79b3452faf04f2572f57eb37b618cc603d9983da
2017-03-31 21:31:43+02:00
Improve documentation of BIO_FLAGS_BASE64_NO_NL flag. Fixes #12491. Reviewed-by: Matt Caswell <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/17744)
8bfb7506d210841f2ee4eda8afe96441a0e33fa5
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/8bfb7506d210841f2ee4eda8afe96441a0e33fa5
2022-02-21 13:25:25+01:00
crypto/ui/ui_openssl.c: let new-line through after query in Windows path. Originally new-line was suppressed, because double new-line was observed under wine. But it appears rather to be a wine bug, because on real Windows new-line is much needed. Reviewed-by: Richard Levitte <[email protected]>
6ebce6803eccc29d00b8b15a858872a1b94d0cf0
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/6ebce6803eccc29d00b8b15a858872a1b94d0cf0
2016-08-01 10:48:13+02:00
Improve some BN documentation. Thanks to Nicolas Schodet for pointing this out. Reviewed-by: Tim Hudson <[email protected]> (Merged from https://github.com/openssl/openssl/pull/5141)
b713c4fff76d84eb67436045b46cc775f40deb47
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/b713c4fff76d84eb67436045b46cc775f40deb47
2018-01-22 14:41:09-05:00
Work around Travis "virtual memory exhausted" error One particular build was running out of memory. By swapping to debug mode we reduce the optimisation level which should reduce the amount of memory required. [extended tests] Reviewed-by: Andy Polyakov <[email protected]> (Merged from https://github.com/openssl/openssl/pull/3601)
042597b0ace7e3adc8a79f6e096eef659ce1d9d5
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/042597b0ace7e3adc8a79f6e096eef659ce1d9d5
2017-06-01 17:35:23+01:00
err_set_debug(): Prevent possible recursion on malloc failure Fixes #19331 Reviewed-by: Paul Dale <[email protected]> Reviewed-by: Richard Levitte <[email protected]> (Merged from https://github.com/openssl/openssl/pull/19332)
ed49476a16b8ff2688a53a2ba7e011e6911620f8
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/ed49476a16b8ff2688a53a2ba7e011e6911620f8
2022-10-03 10:40:40+02:00
Fix DTLS unprocessed records bug During a DTLS handshake we may get records destined for the next epoch arrive before we have processed the CCS. In that case we can't decrypt or verify the record yet, so we buffer it for later use. When we do receive the CCS we work through the queue of unprocessed records and process them. Unfortunately the act of processing wipes out any existing packet data that we were still working through. This includes any records from the new epoch that were in the same packet as the CCS. We should only process the buffered records if we've not got any data left. Reviewed-by: Richard Levitte <[email protected]>
738ad946ddf7cbb839447981304df89f5f83b18b
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/738ad946ddf7cbb839447981304df89f5f83b18b
2016-07-05 09:51:08+01:00
Fix encrypt-then-mac implementation for DTLS OpenSSL 1.1.0 will negotiate EtM on DTLS but will then not actually *do* it. If we use DTLSv1.2 that will hopefully be harmless since we'll tend to use an AEAD ciphersuite anyway. But if we're using DTLSv1, then we certainly will end up using CBC, so EtM is relevant — and we fail to interoperate with anything that implements EtM correctly. Fixing it in HEAD and 1.1.0c will mean that 1.1.0[ab] are incompatible with 1.1.0c+... for the limited case of non-AEAD ciphers, where they're *already* incompatible with other implementations due to this bug anyway. That seems reasonable enough, so let's do it. The only alternative is just to turn it off for ever... which *still* leaves 1.0.0[ab] failing to communicate with non-OpenSSL implementations anyway. Tested against itself as well as against GnuTLS both with and without EtM. Reviewed-by: Tim Hudson <[email protected]> Reviewed-by: Matt Caswell <[email protected]>
e23d5071ec4c7aa6bb2b0f2c3e0fc2182ed7e63f
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/e23d5071ec4c7aa6bb2b0f2c3e0fc2182ed7e63f
2016-10-12 23:12:04+01:00
CRL critical extension bugfix More importantly, port CRL test from boringSSL crypto/x509/x509_test.cc Reviewed-by: Richard Levitte <[email protected]> (Merged from https://github.com/openssl/openssl/pull/1775)
2b40699082d1e5d0e94811542c4f0633ab2d5989
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/2b40699082d1e5d0e94811542c4f0633ab2d5989
2016-11-28 15:33:40-05:00
cmp_mock_srv.c: improve comment on cert to be produced from request template Reviewed-by: Paul Dale <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: David von Oheimb <[email protected]> (Merged from https://github.com/openssl/openssl/pull/21086)
5def4bbb4be5477146a0fbb4f14ee02df026419c
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/5def4bbb4be5477146a0fbb4f14ee02df026419c
2023-05-30 21:15:09+02:00
chacha/asm/chacha-ppc.pl: improve performance by 40/80% on POWER8/9. Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/6419)
791cc3029bd2aee7fc6b766b9841ce1e0a14484a
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/791cc3029bd2aee7fc6b766b9841ce1e0a14484a
2018-06-05 19:59:19+02:00
Mark a HelloRequest record as read if we ignore it Otherwise the client will try to process it again. The second time around it will try and move the record data into handshake fragment storage and realise that there is no data left. At that point it marks it as read anyway. However, it is a bug that we go around the loop a second time, so we prevent that. Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/2200)
290a0419f0c13a30fb3a1d1a279125c8aeafd17e
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/290a0419f0c13a30fb3a1d1a279125c8aeafd17e
2017-01-09 17:29:44+00:00
ec/curve448/f_generic.c: fix VC-WIN32 debug build failure. Debugging asserts had implicit casts that triggered the warnings. However, instead of making the casts explicit it's more appropriate to perform checks that ensure that implicit casts were safe. ec/curve448/scalar.c: size_t-fy scalar_decode_short. Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/5494)
9cbcea7e68f0e805109d7d253c31f02ba37b3b2b
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/9cbcea7e68f0e805109d7d253c31f02ba37b3b2b
2018-03-02 22:16:29+01:00
cms: fix memleaks in cms_env.c CLA: trivial Reviewed-by: Paul Dale <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/16403) (cherry picked from commit 58e1e397c6774be11b903c0f88e85bd2b8c4206f)
5327da81f0c70e35bdd8860af9af351313ca4ae2
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/5327da81f0c70e35bdd8860af9af351313ca4ae2
2021-08-24 22:43:18+08:00
VMS getnameinfo() seems to have a bug with returned service string It seems like it gives back gibberish. If we asked for a numeric service, it's easy to check for a digit in the first position, and if there isn't any, rewrite it using older methods. Reviewed-by: Rich Salz <[email protected]>
d40cf9bc9c0913310ef2232b13d8e15e73e9d2b4
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/d40cf9bc9c0913310ef2232b13d8e15e73e9d2b4
2016-02-10 05:12:52+01:00
Fix BIO_f_cipher() flushing If an error occurs during a flush on a BIO_f_cipher() then in some cases we could get into an infinite loop. We add a check to make sure we are making progress during flush and exit if not. This issue was reported by Octavio Galland who also demonstrated an infinite loop in CMS encryption as a result of this bug. The security team has assessed this issue as not a CVE. This occurs on *encryption* only which is typically processing trusted data. We are not aware of a way to trigger this with untrusted data. Reviewed-by: Hugo Landau <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/19918)
e51dd6ee1bac6b54debea3f48c6f58b761229b73
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/e51dd6ee1bac6b54debea3f48c6f58b761229b73
2022-12-06 14:18:53+00:00
Fix aesni_xts compile error Block copy bug.. Reviewed-by: Richard Levitte <[email protected]> (Merged from https://github.com/openssl/openssl/pull/9900)
f407a9a998f95f693a7127bc76a2c922dfaedbdb
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/f407a9a998f95f693a7127bc76a2c922dfaedbdb
2019-09-15 19:29:02+10:00
Fix a failure to NULL a pointer freed on error. Inspired by BoringSSL commit 517073cd4b by Eric Roman <[email protected]> CVE-2015-0209 Reviewed-by: Emilia Käsper <[email protected]>
9e442d485008046933cdc7da65080f436a4af089
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/9e442d485008046933cdc7da65080f436a4af089
2015-02-09 11:38:41+00:00
sha/asm/keccak1600-avx512.pl: absorb bug-fix and minor optimization. Hardware used for benchmarking courtesy of Atos, experiments run by Romain Dolbeau <[email protected]>. Kudos! Reviewed-by: Rich Salz <[email protected]>
0d7903f83f84bba1d29225efd999c633a0c5ba01
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/0d7903f83f84bba1d29225efd999c633a0c5ba01
2017-07-20 13:56:17+02:00
Fix bug in OPENSSL_LH_flush Fixes #18139. Reviewed-by: Richard Levitte <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/18141)
e5da68183410c06f7b350a0721bc2bd6057e438e
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/e5da68183410c06f7b350a0721bc2bd6057e438e
2022-04-21 16:10:33+01:00
Fix bug in OSSL_CMP_SRV_process_request() on transaction renewal Reviewed-by: Matt Caswell <[email protected]> Reviewed-by: Viktor Dukhovni <[email protected]> (Merged from https://github.com/openssl/openssl/pull/11736)
045229cfe88aba44f8b67e7306281f6fbf516625
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/045229cfe88aba44f8b67e7306281f6fbf516625
2020-05-04 19:53:09+02:00
VMS: don't use /DSF, turn off CALL_DEBUG instead It turns out that /DSF didn't do any good for our purposes. Instead, remove the CALL_DEBUG flag from any image we link. This ensures that we can have debugging information in the image files, but don't automatically end up in a debugging session upon image activation. Unfortunately, this means the CALL_DEBUG must be turned on when there is a need to run with the debugger activated, and to turn it off when done. This has been documented in NOTES.VMS. Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/2957)
1ae4c07e50a4988c7e2263ad669dc75fe2d494cb
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/1ae4c07e50a4988c7e2263ad669dc75fe2d494cb
2017-03-15 02:52:20+01:00
Improve the documentation of cert path building and validation Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/13735)
f9ac6f6956a23bd89e1d6bc9b5dcbb3df06544a1
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/f9ac6f6956a23bd89e1d6bc9b5dcbb3df06544a1
2020-12-23 23:29:04+01:00
[doc/man3][OSSL_ENCODER] Move NOTES to the bottom For consistency with `OSSL_DECODER.pod`, and `man-pages(7)`, the `NOTES` section is moved at the end of the file. According to `man-pages(7)` the recommended section order is: > NAME > SYNOPSIS > CONFIGURATION [Normally only in Section 4] > DESCRIPTION > OPTIONS [Normally only in Sections 1, 8] > EXIT STATUS [Normally only in Sections 1, 8] > RETURN VALUE [Normally only in Sections 2, 3] > ERRORS [Typically only in Sections 2, 3] > ENVIRONMENT > FILES > VERSIONS [Normally only in Sections 2, 3] > CONFORMING TO > NOTES > BUGS > EXAMPLE > SEE ALSO This commit does not attempt to fix the order in all pages but focuses only on `OSSL_ENCODER` which has a "twin" man page in `OSSL_DECODER`, making the inconsistent section order quite jarring. Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/13932)
3a962b2093a6226daa26e4d1855d4eb9f2e5035b
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/3a962b2093a6226daa26e4d1855d4eb9f2e5035b
2021-01-22 18:50:12+02:00
Fix bug in async_fibre_makecontext for POSIX async_fibre_makecontext was initialise the fibre first and then calling getcontext(). It should be the other way around because the getcontext call may overwrite some of the things we just initialised. This didn't cause an issue on Linux and so the problem went unnoticed. On OS-X it causes a crash. Reviewed-by: Rich Salz <[email protected]>
90fa7296c22583a0a42203b078979bbfb2fcb11d
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/90fa7296c22583a0a42203b078979bbfb2fcb11d
2015-10-11 16:17:27+01:00
bn/asm/rsax-x86_64.pl: constant-time gather procedure. Performance penalty is 2% on Linux and 5% on Windows. CVE-2016-0702 Reviewed-by: Richard Levitte <[email protected]> Reviewed-by: Rich Salz <[email protected]>
5ea08bd2fe6538cbccd89f07e6f1cdd5d3e75e3f
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/5ea08bd2fe6538cbccd89f07e6f1cdd5d3e75e3f
2016-01-25 23:06:45+01:00
fix aes-xts bug on aarch64 big-endian env. Signed-off-by: Liu-ErMeng <[email protected]> Reviewed-by: Tom Cosgrove <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/20797)
4df13d1054e143f1cbf13fa347491807289f87b7
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/4df13d1054e143f1cbf13fa347491807289f87b7
2023-04-21 16:04:51+08:00
Fix build error for aarch64 big endian. Modified rev to rev64, because rev only takes integer registers. https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90827 Otherwise, the following error will occur. Error: operand 1 must be an integer register -- `rev v31.16b,v31.16b' CLA: trivial Signed-off-by: Lei Maohui <[email protected]> Reviewed-by: Shane Lontis <[email protected]> Reviewed-by: Richard Levitte <[email protected]> (Merged from https://github.com/openssl/openssl/pull/9151)
7b0fceed21c8929e0c6694f57018aa1dbba03e15
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/7b0fceed21c8929e0c6694f57018aa1dbba03e15
2019-06-13 12:17:30+09:00
Improve documentation of -no_ssl3, -no_tls1, -no_tls1_1, -no_tls1_2, -no_tls1_3 options Fixes #19014 CLA: trivial Reviewed-by: Tom Cosgrove <[email protected]> Reviewed-by: Paul Dale <[email protected]> Reviewed-by: Hugo Landau <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/20834)
06565f36e78e6155834875ad544bb48838a812e4
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/06565f36e78e6155834875ad544bb48838a812e4
2023-04-26 08:11:01+00:00
Fix CMP code to not assume NUL terminated strings ASN.1 strings may not be NUL terminated. Don't assume they are. CVE-2021-3712 Reviewed-by: Viktor Dukhovni <[email protected]> Reviewed-by: Paul Dale <[email protected]> Reviewed-by: David Benjamin <[email protected]>
95f8c1e142df835d03b5b62521383a462fc5470d
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/95f8c1e142df835d03b5b62521383a462fc5470d
2021-08-18 17:37:23+01:00
Update secmemtest and memeleaktest to use the test infrastructure. It isn't easy to use the test framework since it turns memory debugging on as well and the CRYPTO_mem_leaks_fp function cannot be called twice. Reviewed-by: Richard Levitte <[email protected]> Reviewed-by: Matt Caswell <[email protected]> (Merged from https://github.com/openssl/openssl/pull/3169)
789dfc478eea50d8f47f192ef8f3d359ae386c78
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/789dfc478eea50d8f47f192ef8f3d359ae386c78
2017-04-10 10:05:55+10:00
Fix spelling in pod files Reviewed-by: Richard Levitte <[email protected]> Reviewed-by: Rich Salz <[email protected]>
24c2cd3967ed23acc0bd31a3781c4525e2e42a2c
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/24c2cd3967ed23acc0bd31a3781c4525e2e42a2c
2016-05-01 19:52:58+02:00
Fix memory issues in BIO_*printf functions The internal |fmtstr| function used in processing a "%s" format string in the BIO_*printf functions could overflow while calculating the length of a string and cause an OOB read when printing very long strings. Additionally the internal |doapr_outch| function can attempt to write to an OOB memory location (at an offset from the NULL pointer) in the event of a memory allocation failure. In 1.0.2 and below this could be caused where the size of a buffer to be allocated is greater than INT_MAX. E.g. this could be in processing a very long "%s" format string. Memory leaks can also occur. These issues will only occur on certain platforms where sizeof(size_t) > sizeof(int). E.g. many 64 bit systems. The first issue may mask the second issue dependent on compiler behaviour. These problems could enable attacks where large amounts of untrusted data is passed to the BIO_*printf functions. If applications use these functions in this way then they could be vulnerable. OpenSSL itself uses these functions when printing out human-readable dumps of ASN.1 data. Therefore applications that print this data could be vulnerable if the data is from untrusted sources. OpenSSL command line applications could also be vulnerable where they print out ASN.1 data, or if untrusted data is passed as command line arguments. Libssl is not considered directly vulnerable. Additionally certificates etc received via remote connections via libssl are also unlikely to be able to trigger these issues because of message size limits enforced within libssl. CVE-2016-0799 Issue reported by Guido Vranken. Reviewed-by: Andy Polyakov <[email protected]>
9cb177301fdab492e4cfef376b28339afe3ef663
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/9cb177301fdab492e4cfef376b28339afe3ef663
2016-02-25 13:09:46+00:00
Fix CRL time comparison. Thanks to David Benjamin <[email protected]> for reporting this bug. Reviewed-by: Rich Salz <[email protected]>
e032117db251968bd09badc7d4718c2497302e55
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/e032117db251968bd09badc7d4718c2497302e55
2016-07-29 17:54:52+01:00
Remove the CRYPTO_mem_leaks adjustment for the BIO CRYPTO_mem_leaks attempts to adjust the count of bytes leaks to not include the BIO that is being used to print the results out. However this does not work properly. In all internal cases we switch off recording the memory allocation during creation of the BIO so it makes no difference. In other cases if the BIO allocates any additional memory during construction then the adjustment will be wrong anyway. It also skips over the BIO memory during print_leak anyway, so the BIO memory is never added into the total. In other words this was broken in lots of ways and has been since it was first added. The simplest solution is just to make it the documented behaviour that you must turn off memory logging when creating the BIO, and remove all the adjustment stuff completely. The adjustment code was only ever in master and never made it to a release branch so there is no loss of functionality. This commit also fixes a compilation failure when using enable-crypto-mdebug. Reviewed-by: Rich Salz <[email protected]>
b3895f42a9a90a74097c75e39d87ed3212be18dd
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/b3895f42a9a90a74097c75e39d87ed3212be18dd
2016-03-30 18:12:59+01:00
RSA key generation: ensure BN_mod_inverse and BN_mod_exp_mont both get called with BN_FLG_CONSTTIME flag set. Based on an original patch by Billy Brumley CVE-2018-0737 Reviewed-by: Rich Salz <[email protected]>
54f007af94b8924a46786b34665223c127c19081
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/54f007af94b8924a46786b34665223c127c19081
2018-04-12 12:07:53+01:00
Travis build matrix adjustments - do not exclude all clang builds on Linux - exclude the constantly timeouting -fsanitize=address build on OS/X - drop some mostly duplicate builds - change the base linux distro to Bionic - drop sudo as that is no longer needed - always on - drop -D__NO_STRING_INLINES where not needed - memleak test is not working with old clang Reviewed-by: Richard Levitte <[email protected]> (Merged from https://github.com/openssl/openssl/pull/11468)
fbc6efbbc16fc1410f776431395ea2b2ad691d4c
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/fbc6efbbc16fc1410f776431395ea2b2ad691d4c
2020-04-03 17:26:57+02:00
Fix build failure with CIPHER_DEBUG Signed-off-by: Rich Salz <[email protected]> Reviewed-by: Kurt Roeckx <[email protected]>
b7557ccf361d61455535d1305f94d04da7235fdb
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/b7557ccf361d61455535d1305f94d04da7235fdb
2016-01-19 21:15:33+00:00
cmp_vfy.c: Fix bug: must verify msg signature also in 3GPP mode Reviewed-by: Shane Lontis <[email protected]> (Merged from https://github.com/openssl/openssl/pull/11808)
7b1a3a506273bc043cefd7c2202300a9bf81daa0
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/7b1a3a506273bc043cefd7c2202300a9bf81daa0
2020-08-18 16:03:29+02:00
Use leak sanitizer instead of internal mdebug to check for memory leaks The leak sanitizer gives better reports (complete stack traces) and works as a wrapper around the application instead of relying on cooperative enabling and disabling calls (which are too easy to get unbalanced). Related to #8322 Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/9294)
22c22369bc09988eb8c6fdf4f543581a78fd3eb1
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/22c22369bc09988eb8c6fdf4f543581a78fd3eb1
2019-07-02 16:23:27+02:00
Reject excessively large primes in DH key generation. CVE-2018-0732 Signed-off-by: Guido Vranken <[email protected]> Reviewed-by: Matthias St. Pierre <[email protected]> Reviewed-by: Viktor Dukhovni <[email protected]> Reviewed-by: Rich Salz <[email protected]> Reviewed-by: Matt Caswell <[email protected]> (Merged from https://github.com/openssl/openssl/pull/6457)
91f7361f47b082ae61ffe1a7b17bb2adf213c7fe
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/91f7361f47b082ae61ffe1a7b17bb2adf213c7fe
2018-06-11 19:38:54+02:00
Deprecated {OPENSSL,CRYPTO}_debug_mem_{push,pop} They were only used for recursive ASN1 parsing. Even if the internal memory-debugging facility remains, this simplification seems worthwhile. Reviewed-by: Shane Lontis <[email protected]> Reviewed-by: Matthias St. Pierre <[email protected]> Reviewed-by: Richard Levitte <[email protected]> (Merged from https://github.com/openssl/openssl/pull/9342)
e7aa7c11c71e84b2d6c06b1c81d130e8c1fba296
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/e7aa7c11c71e84b2d6c06b1c81d130e8c1fba296
2019-07-10 16:22:12-04:00
chacha/asm/chacha-ppc.pl: fix big-endian build. It's kind of a "brown-bag" bug, as I did recognize the problem and verified an ad-hoc solution, but failed to follow up with cross-checks prior filing previous merge request. Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/6435)
10f279713ae39736ca1c7bcb09e240c7c5fb298a
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/10f279713ae39736ca1c7bcb09e240c7c5fb298a
2018-06-07 14:04:34+02:00
Drop the optimisation level for ppc64le cross-compile The default cross compiler (gcc 9.4.0) for ppc64le on Ubunut 20.04 seems buggy and causes a seg fault in sslapitest. This doesn't impact any other CI cross compile platforms and does not seem to impact the gcc 10.3.0 cross compiler. We just drop the optimisation level on that platform. Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: Hugo Landau <[email protected]> (Merged from https://github.com/openssl/openssl/pull/19056)
200d9521a0d406a7d02778d1c6c5a5230caeecf5
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/200d9521a0d406a7d02778d1c6c5a5230caeecf5
2022-08-24 15:10:56+01:00
Fix common test framework options PR#6975 added the ability to our test framework to have common options to all tests. For example providing the option "-test 5" to one of our test programs will just run test number 5. This can be useful when debugging tests. Unforuntately this does not work well for a number of tests. In particular those tests that call test_get_argument() without first skipping over these common test options will not get the expected value. Some tests did this correctly but a large number did not. A helper function is introduced, test_skip_common_options(), to make this easier for those tests which do not have their own specialised test option handling, but yet still need to call test_get_argument(). This function call is then added to all those tests that need it. Reviewed-by: Shane Lontis <[email protected]> Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/10975)
8d242823ed2270e2907914fb09004ae30263fb00
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/8d242823ed2270e2907914fb09004ae30263fb00
2020-01-30 15:30:17+00:00
x509: improve error reporting Distinguish between not being able to extract a public key versus not knowing the key's type. Alternative to #15921 Reviewed-by: Matt Caswell <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/15944)
10af976962b2383bb3044120a764037361b8bff7
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/10af976962b2383bb3044120a764037361b8bff7
2021-06-29 11:43:00+10:00
Add a test for setting initial SNI in CH but not using it with early_data Test for the bug where early_data is not accepted by the server when it does not have an SNI callback set up, but the client sent a servername in the initial ClientHello establishing the session. Reviewed-by: Rich Salz <[email protected]> Reviewed-by: Ben Kaduk <[email protected]> (Merged from https://github.com/openssl/openssl/pull/4519)
141e470947327e0c4e8ef3c299b42d01064c484c
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/141e470947327e0c4e8ef3c299b42d01064c484c
2017-10-11 14:42:25+01:00
Fix Seg fault in DTLSv1_listen The DTLSv1_listen function is intended to be stateless and processes the initial ClientHello from many peers. It is common for user code to loop over the call to DTLSv1_listen until a valid ClientHello is received with an associated cookie. A defect in the implementation of DTLSv1_listen means that state is preserved in the SSL object from one invokation to the next that can lead to a segmentation fault. Erorrs processing the initial ClientHello can trigger this scenario. An example of such an error could be that a DTLS1.0 only client is attempting to connect to a DTLS1.2 only server. CVE-2015-0207 Reviewed-by: Richard Levitte <[email protected]>
e83ee04bb7de800cdb71d522fa562e99328003a3
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/e83ee04bb7de800cdb71d522fa562e99328003a3
2015-03-09 16:09:04+00:00
Fix a memleak in tls13_generate_secret. Reviewed-by: Matt Caswell <[email protected]> Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/3660)
71d8c138cf0a72663cd401d753564eecd8c23289
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/71d8c138cf0a72663cd401d753564eecd8c23289
2017-06-12 19:30:10+02:00
Test ocsp with invalid responses and the "-no_cert_checks" option The "-no_cert_checks" option causes the flag OCSP_NOCHECKS to be set. The bug fixed in the previous commit will cause the ocsp app to respond with a success result in the case when the OCSP response signing certificate fails to verify and -no_cert_checks is used - so we test that it fails in this case. Reviewed-by: Paul Dale <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: Matt Caswell <[email protected]>
6ee1f4f40b5100ef2744866a727bb4b9ef8ea39e
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/6ee1f4f40b5100ef2744866a727bb4b9ef8ea39e
2022-04-13 16:47:35+01:00
bio: improve error checking fixing coverity 1485659 & 1485665 Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/15635)
37bbe449294b63f87b03e792cae465b0b095299a
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/37bbe449294b63f87b03e792cae465b0b095299a
2021-06-07 09:20:16+10:00
improve comment: use "optimization" for clarity The previous word was a misspelling of nicety Reviewed-by: Richard Levitte <[email protected]> Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/3464)
6bcb4175e64f1883b8125d18d8898d30391b19bf
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/6bcb4175e64f1883b8125d18d8898d30391b19bf
2017-05-14 09:17:30+00:00
Fix NULL pointer dereference for BN_mod_exp2_mont This fixes a bug whereby BN_mod_exp2_mont can dereference a NULL pointer if BIGNUM argument m represents zero. Regression test added. Fixes #17648. Reviewed-by: Matt Caswell <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/17783)
43135a5d2274c24e97f50e16ce492c22eb717ab2
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/43135a5d2274c24e97f50e16ce492c22eb717ab2
2022-03-01 14:08:12+00:00
ERR: Add new building blocks for reporting errors The new building block are ERR_new(), ERR_set_debug(), ERR_set_error(), ERR_vset_error(), which allocate a new error record and set the diverse data in them. They are designed in such a way that it's reasonably easy to create macros that use all of them but then rely completely on the function signature of ERR_set_error() or ERR_vset_error(). Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/9452)
7c0e20dc6f11aa506abc99ccc90b3a39c48c3052
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/7c0e20dc6f11aa506abc99ccc90b3a39c48c3052
2019-07-24 13:03:32+02:00
Fix spelling Signed-off-by: Kurt Roeckx <[email protected]> Reviewed-by: Matt Caswell <[email protected]> GH: #1021
d5e86796843ff0b1dab087ce2a6f867768436b63
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/d5e86796843ff0b1dab087ce2a6f867768436b63
2016-05-03 19:34:03+02:00
Update evp_test to make sure passing partial block to "Update" is ok The previous commit fixed a bug where a partial block had been passed to an "Update" function and it wasn't properly handled. We should catch this type of error in evp_test. Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/2275)
0b96d77a62d8ac9a45ac1dda47560ced676b5b8d
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/0b96d77a62d8ac9a45ac1dda47560ced676b5b8d
2017-01-23 12:45:33+00:00
Remove debugging prints from util/add-depends.pl Reviewed-by: Andy Polyakov <[email protected]> (Merged from https://github.com/openssl/openssl/pull/5608)
4ba5ce651790264cdd0e1af3564cf68f8be9ac81
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/4ba5ce651790264cdd0e1af3564cf68f8be9ac81
2018-03-13 19:38:04+01:00