summaryrefslogtreecommitdiff
path: root/src/lib/libssl/d1_both.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Do not recurse when a 'Hello Request' message is received while gettingjsing2014-06-051-1/+2
| | | | | | | | | DTLS fragments. A stream of 'Hello Request' messages will result in infinite recursion, eventually crashing the DTLS client or server. Fixes CVE-2014-0221, from OpenSSL. Reported to OpenSSL by Imre Rad.
* Avoid a buffer overflow that can be triggered by sending specially craftedjsing2014-06-051-1/+7
| | | | | | | | | | DTLS fragments. Fix for CVE-2014-0195, from OpenSSL. Reported to OpenSSL by Juri Aedla. ok deraadt@ beck@
* BUF_MEM_grow_clean() takes a size_t as the size argument. Remove false commentsmiod2014-05-311-1/+1
| | | | | | | mentioning it's an int, bogus (int) casts and bounds checks against INT_MAX (BUF_MEM_grow_clean has its own integer bounds checks). ok deraadt@
* remove some #if 0 code. we don't need any more reminders that we're usingtedu2014-05-301-49/+0
| | | | a not quite appropriate data structure. ok jsing
* There is no point in checking if a pointer is non-NULL before calling free,jsing2014-05-281-6/+3
| | | | | | | | since free already does this for us. Also remove some pointless NULL assignments, where the result from malloc(3) is immediately assigned to the same variable. ok miod@
* Stop pulling pqueue.h into ssl_locl.h since only a small part of libssljsing2014-05-221-0/+2
| | | | | | | | | | actually needs it. Instead, just include it in the files where it is actually necessary. Also remove standard includes from pqueue.h so that they are not available as a side effect. Just add the two includes that are needed to pqueue.c. ok miod@
* In dtls1_reassemble_fragment() and dtls1_process_out_of_seq_message(), in casemiod2014-05-181-7/+3
| | | | | | | | of error, make sure we do not free pitem which is still linked into the pqueue. In the same vain, only free `frag' if we allocated it in this function. Help and ok beck@
* Avoid a potential null pointer dereference by checking that we actuallyjsing2014-04-301-0/+2
| | | | | | managed to allocate a fragment, before trying to memcpy data into it. ok miod@
* More KNF.jsing2014-04-241-92/+122
|
* more malloc/realloc/calloc cleanups; ok beck kettenisderaadt2014-04-211-3/+3
|
* Change library to use intrinsic memory allocation functions instead ofbeck2014-04-171-12/+12
| | | | | | | | OPENSSL_foo wrappers. This changes: OPENSSL_malloc->malloc OPENSSL_free->free OPENSSL_relloc->realloc OPENSSL_freeFunc->free
* fix a few bugs observed on http://www.viva64.com/en/b/0250/tedu2014-04-161-1/+0
| | | | ok krw miod
* correct cases of code occuring directly after goto/break/returnjsg2014-04-151-1/+1
| | | | ok miod@ guenther@
* make OPENSSL_NO_HEARTBLEED the default and only option. ok deraadt miodtedu2014-04-141-153/+0
|
* First pass at applying KNF to the OpenSSL code, which almost makes itjsing2014-04-141-565/+501
| | | | | readable. This pass is whitespace only and can readily be verified using tr and md5.
* Flense a variety of windows support stuff, and a strange gettimeofday function.beck2014-04-131-7/+0
| | | | ok deraadt@
* Merge conflicts; remove MacOS, Netware, OS/2, VMS and Windows build machinery.miod2014-04-131-4/+4
|
* cherrypick fix for CVE-2014-0160 "heartbleed" vulnerability fromdjm2014-04-071-8/+18
| | | | OpenSSL git; ok sthen@
* SECURITY fixes backported from openssl-1.0.1f. ok mikeb@jca2014-02-271-0/+7
| | | | | | | | | | | | CVE-2013-4353 NULL pointer dereference with crafted Next Protocol Negotiation record in TLS handshake. Upstream: 197e0ea CVE-2013-6449 Fix crash with crafted traffic from a TLS 1.2 client. Upstream: ca98926, 0294b2b CVE-2013-6450 Fix DTLS retransmission from previous session. Upstream: 3462896
* import OpenSSL-1.0.1cdjm2012-10-131-3/+175
|
* OpenSSL 1.0.0f: import upstream sourcedjm2012-01-051-7/+16
|
* import OpenSSL 1.0.0edjm2011-11-031-18/+10
|
* import OpenSSL-1.0.0adjm2010-10-011-201/+426
|
* import of OpenSSL 0.9.8hdjm2008-09-061-0/+1193