Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Do not recurse when a 'Hello Request' message is received while getting | jsing | 2014-06-05 | 1 | -1/+2 |
| | | | | | | | | | DTLS fragments. A stream of 'Hello Request' messages will result in infinite recursion, eventually crashing the DTLS client or server. Fixes CVE-2014-0221, from OpenSSL. Reported to OpenSSL by Imre Rad. | ||||
* | Avoid a buffer overflow that can be triggered by sending specially crafted | jsing | 2014-06-05 | 1 | -1/+7 |
| | | | | | | | | | | DTLS fragments. Fix for CVE-2014-0195, from OpenSSL. Reported to OpenSSL by Juri Aedla. ok deraadt@ beck@ | ||||
* | BUF_MEM_grow_clean() takes a size_t as the size argument. Remove false comments | miod | 2014-05-31 | 1 | -1/+1 |
| | | | | | | | mentioning it's an int, bogus (int) casts and bounds checks against INT_MAX (BUF_MEM_grow_clean has its own integer bounds checks). ok deraadt@ | ||||
* | remove some #if 0 code. we don't need any more reminders that we're using | tedu | 2014-05-30 | 1 | -49/+0 |
| | | | | a not quite appropriate data structure. ok jsing | ||||
* | There is no point in checking if a pointer is non-NULL before calling free, | jsing | 2014-05-28 | 1 | -6/+3 |
| | | | | | | | | since free already does this for us. Also remove some pointless NULL assignments, where the result from malloc(3) is immediately assigned to the same variable. ok miod@ | ||||
* | Stop pulling pqueue.h into ssl_locl.h since only a small part of libssl | jsing | 2014-05-22 | 1 | -0/+2 |
| | | | | | | | | | | actually needs it. Instead, just include it in the files where it is actually necessary. Also remove standard includes from pqueue.h so that they are not available as a side effect. Just add the two includes that are needed to pqueue.c. ok miod@ | ||||
* | In dtls1_reassemble_fragment() and dtls1_process_out_of_seq_message(), in case | miod | 2014-05-18 | 1 | -7/+3 |
| | | | | | | | | of error, make sure we do not free pitem which is still linked into the pqueue. In the same vain, only free `frag' if we allocated it in this function. Help and ok beck@ | ||||
* | Avoid a potential null pointer dereference by checking that we actually | jsing | 2014-04-30 | 1 | -0/+2 |
| | | | | | | managed to allocate a fragment, before trying to memcpy data into it. ok miod@ | ||||
* | More KNF. | jsing | 2014-04-24 | 1 | -92/+122 |
| | |||||
* | more malloc/realloc/calloc cleanups; ok beck kettenis | deraadt | 2014-04-21 | 1 | -3/+3 |
| | |||||
* | Change library to use intrinsic memory allocation functions instead of | beck | 2014-04-17 | 1 | -12/+12 |
| | | | | | | | | OPENSSL_foo wrappers. This changes: OPENSSL_malloc->malloc OPENSSL_free->free OPENSSL_relloc->realloc OPENSSL_freeFunc->free | ||||
* | fix a few bugs observed on http://www.viva64.com/en/b/0250/ | tedu | 2014-04-16 | 1 | -1/+0 |
| | | | | ok krw miod | ||||
* | correct cases of code occuring directly after goto/break/return | jsg | 2014-04-15 | 1 | -1/+1 |
| | | | | ok miod@ guenther@ | ||||
* | make OPENSSL_NO_HEARTBLEED the default and only option. ok deraadt miod | tedu | 2014-04-14 | 1 | -153/+0 |
| | |||||
* | First pass at applying KNF to the OpenSSL code, which almost makes it | jsing | 2014-04-14 | 1 | -565/+501 |
| | | | | | readable. This pass is whitespace only and can readily be verified using tr and md5. | ||||
* | Flense a variety of windows support stuff, and a strange gettimeofday function. | beck | 2014-04-13 | 1 | -7/+0 |
| | | | | ok deraadt@ | ||||
* | Merge conflicts; remove MacOS, Netware, OS/2, VMS and Windows build machinery. | miod | 2014-04-13 | 1 | -4/+4 |
| | |||||
* | cherrypick fix for CVE-2014-0160 "heartbleed" vulnerability from | djm | 2014-04-07 | 1 | -8/+18 |
| | | | | OpenSSL git; ok sthen@ | ||||
* | SECURITY fixes backported from openssl-1.0.1f. ok mikeb@ | jca | 2014-02-27 | 1 | -0/+7 |
| | | | | | | | | | | | | CVE-2013-4353 NULL pointer dereference with crafted Next Protocol Negotiation record in TLS handshake. Upstream: 197e0ea CVE-2013-6449 Fix crash with crafted traffic from a TLS 1.2 client. Upstream: ca98926, 0294b2b CVE-2013-6450 Fix DTLS retransmission from previous session. Upstream: 3462896 | ||||
* | import OpenSSL-1.0.1c | djm | 2012-10-13 | 1 | -3/+175 |
| | |||||
* | OpenSSL 1.0.0f: import upstream source | djm | 2012-01-05 | 1 | -7/+16 |
| | |||||
* | import OpenSSL 1.0.0e | djm | 2011-11-03 | 1 | -18/+10 |
| | |||||
* | import OpenSSL-1.0.0a | djm | 2010-10-01 | 1 | -201/+426 |
| | |||||
* | import of OpenSSL 0.9.8h | djm | 2008-09-06 | 1 | -0/+1193 |