3352a4f6 | 18-Mar-2021 |
Pauli |
test: fix coverity 1451550: unchecked return value Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14615) |
f4786515 | 18-Mar-2021 |
Pauli |
test: fix coverity 1429210: unchecked return value Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14615) |
b8cb90cd | 18-Mar-2021 |
Pauli |
test: fix coverity 1416888: unchecked return value Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14615) |
0d2b8bd2 | 18-Mar-2021 |
Pauli |
test: fix coverity 1414451: unchecked return value Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14615) |
a02d70dd | 18-Mar-2021 |
Pauli |
apps: fix coverity 1358776, 1451513, 1451519, 1451531 & 1473387: unchecked return values Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/
apps: fix coverity 1358776, 1451513, 1451519, 1451531 & 1473387: unchecked return values Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14615)
show more ...
|
6a6844a2 | 18-Mar-2021 |
Pauli |
test: fix coverity 1338157: unchecked return value Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14615) |
3c4c8dd8 | 19-Mar-2021 |
Pauli |
encoder: fix coverity 1473235: null dereference Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14618) |
26d52442 | 19-Mar-2021 |
Pauli |
apps: fix coverity 1470781: explicit null dereference Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14618) |
fbe286a3 | 19-Mar-2021 |
Pauli |
sm2: fix coverity 1467503: explicit null dereference Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14618) |
993237a8 | 19-Mar-2021 |
Pauli |
rsa: fix coverity 1463571: explicit null dereference Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14618) |
8f4cddbc | 23-Mar-2021 |
Pauli |
rand: fix coverity 1473636: data race condition Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14651) |
9aa4be69 | 23-Mar-2021 |
Pauli |
x509: fix coverity 1474424: data race condition Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14651) |
96a68f21 | 23-Mar-2021 |
Pauli |
x509: fix coverity 1461225: data race condition Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14651) |
4f0831b8 | 23-Mar-2021 |
Tomas Mraz |
EVP_PKCS82PKEY: Create provided keys if possible Use OSSL_DECODER to decode the PKCS8 data to create provided keys. If that fails fallback to the legacy implementation. Fix
EVP_PKCS82PKEY: Create provided keys if possible Use OSSL_DECODER to decode the PKCS8 data to create provided keys. If that fails fallback to the legacy implementation. Fixes #14302 Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14659)
show more ...
|
468d9d55 | 25-Mar-2021 |
Matt Caswell |
Update CHANGES.md and NEWS.md for new release Reviewed-by: Tomas Mraz <tomas@openssl.org> |
39a14059 | 18-Mar-2021 |
Matt Caswell |
Ensure buffer/length pairs are always in sync Following on from CVE-2021-3449 which was caused by a non-zero length associated with a NULL buffer, other buffer/length pairs are updated t
Ensure buffer/length pairs are always in sync Following on from CVE-2021-3449 which was caused by a non-zero length associated with a NULL buffer, other buffer/length pairs are updated to ensure that they too are always in sync. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org>
show more ...
|
02b1636f | 15-Mar-2021 |
Peter Kaestle |
ssl sigalg extension: fix NULL pointer dereference As the variable peer_sigalgslen is not cleared on ssl rehandshake, it's possible to crash an openssl tls secured server remotely by sen
ssl sigalg extension: fix NULL pointer dereference As the variable peer_sigalgslen is not cleared on ssl rehandshake, it's possible to crash an openssl tls secured server remotely by sending a manipulated hello message in a rehandshake. On such a manipulated rehandshake, tls1_set_shared_sigalgs() calls tls12_shared_sigalgs() with the peer_sigalgslen of the previous handshake, while the peer_sigalgs has been freed. As a result tls12_shared_sigalgs() walks over the available peer_sigalgs and tries to access data of a NULL pointer. This issue was introduced by c589c34e61 (Add support for the TLS 1.3 signature_algorithms_cert extension, 2018-01-11). Signed-off-by: Peter Kästle <peter.kaestle@nokia.com> Signed-off-by: Samuel Sapalski <samuel.sapalski@nokia.com> CVE-2021-3449 CLA: trivial Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org>
show more ...
|
112580c2 | 18-Mar-2021 |
Matt Caswell |
Add a test for CVE-2021-3449 We perform a reneg handshake, where the second ClientHello drops the sig_algs extension. It must also contain cert_sig_algs for the test to work.
Add a test for CVE-2021-3449 We perform a reneg handshake, where the second ClientHello drops the sig_algs extension. It must also contain cert_sig_algs for the test to work. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org>
show more ...
|
ae937a09 | 18-Mar-2021 |
Matt Caswell |
Teach TLSProxy how to encrypt <= TLSv1.2 ETM records Previously TLSProxy only knew how to "repack" messages for TLSv1.3. Most of the handshake in <= TLSv1.2 is unencrypted so this hasn't
Teach TLSProxy how to encrypt <= TLSv1.2 ETM records Previously TLSProxy only knew how to "repack" messages for TLSv1.3. Most of the handshake in <= TLSv1.2 is unencrypted so this hasn't been too much of restriction. However we now want to modify reneg handshakes which are encrypted so we need to add that capability. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org>
show more ...
|
eb78f955 | 19-Mar-2021 |
Rich Salz |
Make fipsinstall -out flag optional If -out is not specified, send output to stdout. Fix documentation errors. Remove "-out -" from an invocation. Reviewed-by: Shane Lontis
Make fipsinstall -out flag optional If -out is not specified, send output to stdout. Fix documentation errors. Remove "-out -" from an invocation. Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14623)
show more ...
|
b238e78f | 23-Mar-2021 |
Andrey Matyukov |
Rearranged .pdata entries in rsaz-avx512.pl to make them properly ordered. Fixes #14660: Windows linking error Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Richard L
Rearranged .pdata entries in rsaz-avx512.pl to make them properly ordered. Fixes #14660: Windows linking error Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14665)
show more ...
|
1f085af0 | 12-Mar-2021 |
Shane Lontis |
Add coveralls to CI Fixes #14013 Coverage reports were no longer generated when travis stopped being used. This github action workflow schedules a coverage report once a week.
Add coveralls to CI Fixes #14013 Coverage reports were no longer generated when travis stopped being used. This github action workflow schedules a coverage report once a week. Reviewed-by: Tim Hudson <tjh@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14526)
show more ...
|
c08138e5 | 22-Mar-2021 |
Juergen Christ |
Fix compilation under -Werror With strict warnings and warnings as error, openssl currently does not compile due to a missing include. Signed-off-by: Juergen Christ <jchrist@lin
Fix compilation under -Werror With strict warnings and warnings as error, openssl currently does not compile due to a missing include. Signed-off-by: Juergen Christ <jchrist@linux.ibm.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Patrick Steuer <patrick.steuer@de.ibm.com> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14640)
show more ...
|
0dd19e75 | 20-Mar-2021 |
FdaSilvaYY |
Fix a windows build break Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewe
Fix a windows build break Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/14635)
show more ...
|
218e1263 | 21-Mar-2021 |
Pauli |
ec_keymgmt: fix coverity 1474427: resource leak Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14637) |