| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
When blocks of text are flowed with >, e.g.
key: value
foo: >
The quick brown fox jumps
over the lazy dog.
The new-lines of the text block are removed. This causes confusion
when shell scripts are involved, as the following Yaml would be
parsed as one shell command, rather than two:
command: >
echo foo bar
ls
This escaped detection since if text is indented, Yaml treats it as
a different block, so
command: >
if true; then
echo foo bar
fi
is parsed correctly, but
command: >
if true; then
echo foo bar
ls
fi
is not.
To avoid this confusion, we can always use `|`, which will preserve
the newlines, so an explicit continuation can be requested with a
`\` at the end of the line.
command: |
echo foo bar \
baz quux
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
| |
Treat a zero length passed to ssleay_rand_add a no op: the existing logic
zeroes the md value which is very bad. OpenSSL itself never does this
internally and the actual call doesn't make sense as it would be passing
zero bytes of entropy.
Thanks to Marcus Meissner <meissner@suse.de> for reporting this bug.
|
|
|
|
|
|
|
|
|
|
| |
A missing bounds check in the handling of the TLS heartbeat extension
can be used to reveal up to 64k of memory to a connected client or
server.
Thanks for Neel Mehta of Google Security for discovering this bug and to
Adam Langley <agl@chromium.org> and Bodo Moeller <bmoeller@acm.org> for
preparing the fix (CVE-2014-0160)
|
|
|
|
| |
(cherry picked from commit 4e6c12f3088d3ee5747ec9e16d03fc671b8f40be)
|
|
|
|
| |
(cherry picked from commit 997d1aac7cfb957decb62d8f0034a7eca6177fec)
|
|
|
|
| |
(cherry picked from commit 6eebcf345933694e08aba400faf6f639fb4db196)
|
|
|
|
|
|
|
|
|
|
|
|
| |
Enable TLS padding extension using official value from:
http://www.iana.org/assignments/tls-extensiontype-values/tls-extensiontype-values.xhtml
(cherry picked from commit cd6bd5ffda616822b52104fee0c4c7d623fd4f53)
Conflicts:
CHANGES
ssl/tls1.h
|
|
|
|
| |
(cherry picked from commit 6cc0068430d0a4abdef0b466d422e6a4d154a5fe)
|
|
|
|
|
|
|
|
| |
Use bufsiz - 1 not BUFSIZ - 1 when prompting for a password in
the openssl utility.
Thanks to Rob Mackinnon, Leviathan Security for reporting this issue.
(cherry picked from commit 7ba08a4d73c1bdfd3aced09a628b1d7d7747cdca)
|
|
|
|
| |
(cherry picked from commit dbb7654dc189992966ecd95ca66f7a3bb011ab9b)
|
|
|
|
|
|
| |
New -hash_old to generate CRL hashes using old
(before OpenSSL 1.0.0) algorithm.
(cherry picked from commit de2d97cd799f38024d70847bab37d91aa5a2536e)
|
|
|
|
|
|
|
|
| |
A short PEM encoded sequence if passed to the BIO, and the file
had 2 \n following would fail.
PR#3289
(cherry picked from commit 10378fb5f4c67270b800e8f7c600cd0548874811)
|
| |
|
|
|
|
|
|
| |
Use a previously unused value as we will be updating multiple released
branches.
(cherry picked from commit 0737acd2a8cc688902b5151cab5dc6737b82fb96)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Fix for the attack described in the paper "Recovering OpenSSL
ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack"
by Yuval Yarom and Naomi Benger. Details can be obtained from:
http://eprint.iacr.org/2014/140
Thanks to Yuval Yarom and Naomi Benger for discovering this
flaw and to Yuval Yarom for supplying a fix.
(cherry picked from commit 2198be3483259de374f91e57d247d0fc667aef29)
Conflicts:
CHANGES
|
|
|
|
| |
(cherry picked from commit a029788b0e0c19cee4007cc1f73201cf2c13addf)
|
| |
|
|
|
|
|
| |
PR: 3275
(cherry picked from commit ea38f020492042bc1d1adc26ef197b0b9cadf968)
|
|
|
|
|
|
|
| |
[but don't let it mask make's].
PR: 3269
(cherry picked from commit 2f34088e5e9ff02ad20df50571073abac04f1431)
|
|
|
|
| |
(cherry picked from commit 3eddd1706a30cdf3dc9278692d8ee9038eac8a0d)
|
|
|
|
|
| |
PR: 3201
(cherry picked from commit 03da57fe14f2de5bde9d4496a2ae9a4ae8879f88)
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
| |
Windows 8 SDKs complain that GetVersion() is deprecated.
We only use GetVersion like this:
(GetVersion() < 0x80000000)
which checks if the Windows version is NT based. Use a macro check_winnt()
which uses GetVersion() on older SDK versions and true otherwise.
(cherry picked from commit a4cc3c8041104896d51ae12ef7b678c31808ce52)
|
|
|
|
|
|
|
|
| |
Allegedly formwarding to NUL: sometimes creates NUL file in file
system.
PR: 3250
(cherry picked from commit 63aff3001ef6ba2ac376cd3f237fb0d0b3e77f30)
|
|
|
|
|
| |
PR: 3251
Suggested by: Thorsten Schöning
|
|
|
|
|
|
| |
PR: 3251
Suggested by: Thorsten Schöning
(cherry picked from commit 779c51c6446f384c2f2a7bd5cc4c3e0366baf628)
|
|
|
|
|
|
|
|
| |
when adding duplicates in add_cert_dir.
PR: 3261
Reported by: Marian Done
(cherry picked from commit 758954e0d8232d370ed72b7f86640e40443e1778)
|
|
|
|
|
|
|
|
| |
(cherry picked from commit c55fef76f77aa54e85ca534785b2b19cebbe940c)
Conflicts:
util/pl/VC-32.pl
|
|
|
|
| |
(cherry picked from commit 5a7652c3e585e970e5b778074c92e617e48fde38)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
If you use "-newkey rsa" it's supposed to read the default number of bits from the
config file. However the value isn't used to generate the key, but it does
print it's generating such a key. The set_keygen_ctx() doesn't call
EVP_PKEY_CTX_set_rsa_keygen_bits() and you end up with the default set in
pkey_rsa_init() (1024). Afterwards the number of bits gets read from the config
file, but nothing is done with that anymore.
We now read the config first and use the value from the config file when no size
is given.
PR: 2592
(cherry picked from commit 3343220327664680420d4068e1fbe46d2236f1b0)
|
|
|
|
| |
(cherry picked from commit e547c45f1c74e976656c042ec9d873f6eea0e756)
|
|
|
|
| |
(cherry picked from commit 2b4ffc659eabec29f76821f0ac624a2b8c19e4c7)
|
|
|
|
|
|
|
|
|
|
| |
apps/pkcs12.c accepts -password as an argument. The document author
almost certainly meant to write "-password, -passin".
However, that is not correct, either. Actually the code treats
-password as equivalent to -passin, EXCEPT when -export is also
specified, in which case -password as equivalent to -passout.
(cherry picked from commit 856c6dfb09d69fc82ada2611c6cd792dfc60e355)
|
|
|
|
|
|
|
|
|
| |
(cherry picked from commit 8c6d8c2a498146992123ef5407d7ba01a1e7224d)
Conflicts:
CHANGES
ssl/t1_lib.c
|
|
|
|
|
|
|
|
|
| |
(cherry picked from commit 8c6d8c2a498146992123ef5407d7ba01a1e7224d)
Conflicts:
CHANGES
ssl/t1_lib.c
|
|
|
|
|
| |
PR#3253
(cherry picked from commit 7f6e09b5316928a9da24d2f695d1885a26dd38ec)
|
|
|
|
|
|
|
| |
Remove reference to ERR_TXT_MALLOCED in the error library as that is
only used internally. Indicate that returned error data must not be
freed.
(cherry picked from commit f2d678e6e89b6508147086610e985d4e8416e867)
|
|
|
|
| |
(cherry picked from commit cb2182676bdf652070bc272a3896d957763a4324)
|
|
|
|
| |
(cherry picked from commit 717cc8589540b95122a652dee68e6a75b6262d93)
|
|
|
|
| |
PR#3244
|
|
|
|
|
|
|
| |
Always add a dynamically loaded ENGINE to list. Otherwise it can cause
problems when multiply loaded, especially if it adds new public key methods.
For all current engines we only want a single implementation anyway.
(cherry picked from commit e933f91f50108a43c0198cdc63ecdfdbc77b4d0d)
|
|
|
|
|
|
| |
Use default instead of ENGINE version of digest. Without this
errors will occur if you use an ENGINE for a private key and
it doesn't implement the digest in question.
|
|
|
|
| |
PR#3178
|
| |
|
|
|
|
| |
(cherry picked from commit 8f4077ca69076cebaca51b7b666db1ed49e46b9e)
|
| |
|