6f22bcd6 | 09-Dec-2023 |
Neil Horman |
Add appropriate NULL checks in EVP_CIPHER api The EVP_CIPHER api currently assumes that calls made into several APIs have already initalized the cipher in a given context via a call to
Add appropriate NULL checks in EVP_CIPHER api The EVP_CIPHER api currently assumes that calls made into several APIs have already initalized the cipher in a given context via a call to EVP_CipherInit[_ex[2]]. If that hasnt been done, instead of an error, the result is typically a SIGSEGV. Correct that by adding missing NULL checks in the apropriate apis prior to using ctx->cipher Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22995)
show more ...
|
ff78d94b | 22-Jan-2024 |
Bernd Edlinger |
Fix a possible memory leak in req_main if the private key is output to stdout using the HARNESS_OSSL_PREFIX, out is a stack of BIOs and must therefore free'd using BIO_free_all.
Fix a possible memory leak in req_main if the private key is output to stdout using the HARNESS_OSSL_PREFIX, out is a stack of BIOs and must therefore free'd using BIO_free_all. Steps to reproduce: $ HARNESS_OSSL_PREFIX=x OPENSSL_CONF=apps/openssl.cnf util/shlib_wrap.sh apps/openssl req -new -keyout - -passout pass: </dev/null [...] Direct leak of 128 byte(s) in 1 object(s) allocated from: #0 0x7f6f692b89cf in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:69 #1 0x7f6f686eda00 in CRYPTO_malloc crypto/mem.c:202 #2 0x7f6f686edba0 in CRYPTO_zalloc crypto/mem.c:222 #3 0x7f6f68471bdf in BIO_new_ex crypto/bio/bio_lib.c:83 #4 0x7f6f68491a8f in BIO_new_fp crypto/bio/bss_file.c:95 #5 0x555c5f58b378 in dup_bio_out apps/lib/apps.c:3014 #6 0x555c5f58f9ac in bio_open_default_ apps/lib/apps.c:3175 #7 0x555c5f58f9ac in bio_open_default apps/lib/apps.c:3203 #8 0x555c5f528537 in req_main apps/req.c:683 #9 0x555c5f50e315 in do_cmd apps/openssl.c:426 #10 0x555c5f4c5575 in main apps/openssl.c:307 #11 0x7f6f680461c9 in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58 SUMMARY: AddressSanitizer: 128 byte(s) leaked in 1 allocation(s). Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/23365)
show more ...
|
cd5911a6 | 08-Jan-2024 |
Tomas Mraz |
ci.yml: Replace actions-rs/toolchain@v1 with dtolnay/rust-toolchain actions-rs/toolchain is unmaintained and generates warnings Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
ci.yml: Replace actions-rs/toolchain@v1 with dtolnay/rust-toolchain actions-rs/toolchain is unmaintained and generates warnings Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/23232)
show more ...
|
15f479e2 | 19-Jan-2024 |
Tomas Mraz |
tlsfuzzer.sh: Use python3 Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> (Merged from https://github.com/openssl/openssl/pull/23342) |
825b7cb1 | 18-Jan-2024 |
Tomas Mraz |
tlsfuzzer.sh: Make it more informative on errors Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> (Merged from https://github.com/opens
tlsfuzzer.sh: Make it more informative on errors Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> (Merged from https://github.com/openssl/openssl/pull/23342)
show more ...
|
150b3b18 | 05-Jan-2024 |
Tomas Mraz |
tlsfuzzer.sh: Run openssl version on the built app and not system one Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> (Merged from htt
tlsfuzzer.sh: Run openssl version on the built app and not system one Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> (Merged from https://github.com/openssl/openssl/pull/23342)
show more ...
|
017c7cf2 | 03-Jan-2024 |
Tomas Mraz |
gost_engine.sh: Set OPENSSL_ENGINES_DIR Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> (Merged from https://github.com/openssl/openss
gost_engine.sh: Set OPENSSL_ENGINES_DIR Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> (Merged from https://github.com/openssl/openssl/pull/23342)
show more ...
|
de61dba3 | 19-Jan-2024 |
Jakub Wilk |
Fix typos CLA: trivial Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Review
Fix typos CLA: trivial Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/23345)
show more ...
|
f231cc85 | 19-Jan-2024 |
Hugo Landau |
Add CHANGES entry Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/23343) |
d6c3c1d8 | 19-Jan-2024 |
Hugo Landau |
Fix docs Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/23343) |
4991d867 | 19-Jan-2024 |
Hugo Landau |
QUIC MULTISTREAM TEST: Test optimised FIN API Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/open
QUIC MULTISTREAM TEST: Test optimised FIN API Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/23343)
show more ...
|
113be15a | 19-Jan-2024 |
Hugo Landau |
QUIC APL: Implement optimised FIN API Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull
QUIC APL: Implement optimised FIN API Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/23343)
show more ...
|
2695f7b1 | 19-Jan-2024 |
Hugo Landau |
QUIC: Add optimised FIN API Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/23343) |
5ed9a32a | 19-Jan-2024 |
Lars Schmertmann |
Remove mios-simulator-version-min from default iOS configuration * iOS 6 and 7 got its last updates 2014. * Adding -mios-simulator-version-min=14.0 to the configure command leads to two
Remove mios-simulator-version-min from default iOS configuration * iOS 6 and 7 got its last updates 2014. * Adding -mios-simulator-version-min=14.0 to the configure command leads to two occurences of this parameter during compilation. * So lets remove this values to allow a robust configuration from outside and avoid updates here in the future. CLA: trivial Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/23344)
show more ...
|
ffda5af3 | 18-Jan-2024 |
Dr. David von Oheimb |
02-test_errstr.t: make robust on `openssl errstr` crashes Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com
02-test_errstr.t: make robust on `openssl errstr` crashes Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/23330)
show more ...
|
7f7a910b | 15-Jan-2024 |
Frederik Wedel-Heinen |
Removes unsed function: ssl_bad_method() Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (
Removes unsed function: ssl_bad_method() Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/23307)
show more ...
|
a0826b18 | 13-Jan-2024 |
shashankmca80 <38880505+shashankmca80@users.noreply.github.com> |
Uninitialized array variable array"key" is uninitialized and it is being read directly in function SipHash_Init() as per the below statements making a way for the garbage values : uint64
Uninitialized array variable array"key" is uninitialized and it is being read directly in function SipHash_Init() as per the below statements making a way for the garbage values : uint64_t k0 = U8TO64_LE(k); uint64_t k1 = U8TO64_LE(k + 8); CLA: trivial Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/23298)
show more ...
|
5b2d8bc2 | 07-Dec-2023 |
Paul Dreik |
prevent integer overflow in ossl_asn1_time_from_tm this could be triggered by the following code (assuming 64 bit time_t): time_t t = 67768011791126057ULL; ASN1_TIME* at = ASN1_
prevent integer overflow in ossl_asn1_time_from_tm this could be triggered by the following code (assuming 64 bit time_t): time_t t = 67768011791126057ULL; ASN1_TIME* at = ASN1_TIME_set(NULL, t); Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22976)
show more ...
|
017fd465 | 07-Dec-2023 |
Paul Dreik |
add test for provoking integer overflow in ossl_asn1_time_from_tm this needs a sanitized 64 bit time_t build to be detected (or possibly valgrind, trapv or similar) Reviewed-by:
add test for provoking integer overflow in ossl_asn1_time_from_tm this needs a sanitized 64 bit time_t build to be detected (or possibly valgrind, trapv or similar) Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22976)
show more ...
|
c1decd62 | 02-Jan-2024 |
Matt Caswell |
Don't apply max_frag_len checking if no Max Fragment Length extension Don't check the Max Fragment Length if the it hasn't been negotiated. We were checking it anyway, and using the defa
Don't apply max_frag_len checking if no Max Fragment Length extension Don't check the Max Fragment Length if the it hasn't been negotiated. We were checking it anyway, and using the default value (SSL3_RT_MAX_PLAIN_LENGTH). This works in most cases but KTLS can cause the record length to actually exceed this in some cases. Fixes #23169 Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Neil Horman <nhorman@openssl.org> (Merged from https://github.com/openssl/openssl/pull/23182)
show more ...
|
2cac2fef | 02-Jan-2024 |
Matt Caswell |
Fix a FreeBSD build failure when KTLS is enabled Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Neil Horman <nhorman@openssl.org> (Merged from https://github.com/openssl/op
Fix a FreeBSD build failure when KTLS is enabled Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Neil Horman <nhorman@openssl.org> (Merged from https://github.com/openssl/openssl/pull/23182)
show more ...
|
563f4be8 | 02-Jan-2024 |
Matt Caswell |
Add a KTLS test where we write long app data records Check that we can write and read back long app data records when using KTLS. Reviewed-by: Tomas Mraz <tomas@openssl.org>
Add a KTLS test where we write long app data records Check that we can write and read back long app data records when using KTLS. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Neil Horman <nhorman@openssl.org> (Merged from https://github.com/openssl/openssl/pull/23182)
show more ...
|
66adaf2b | 14-Dec-2023 |
Dr. David von Oheimb |
X509_dup.pod: add caveat that extra data is not copied and hints, e.g., to use X509_up_ref() instead Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Tomas Mraz <tomas@opens
X509_dup.pod: add caveat that extra data is not copied and hints, e.g., to use X509_up_ref() instead Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/23043)
show more ...
|
4897bd20 | 05-Jan-2024 |
Frederik Wedel-Heinen |
Move increment of dtls epoch to change cipher state function Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/
Move increment of dtls epoch to change cipher state function Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/23212)
show more ...
|
ead44e19 | 15-Jan-2024 |
Matt Caswell |
Document SSL_R_UNEXPECTED_EOF_WHILE_READING Also document that it is ok to use this for control flow decisions. Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Tom
Document SSL_R_UNEXPECTED_EOF_WHILE_READING Also document that it is ok to use this for control flow decisions. Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/23304)
show more ...
|