1. 10 9月, 2019 1 次提交
    • B
      Fix a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey · 08229ad8
      Bernd Edlinger 提交于
      An attack is simple, if the first CMS_recipientInfo is valid but the
      second CMS_recipientInfo is chosen ciphertext. If the second
      recipientInfo decodes to PKCS #1 v1.5 form plaintext, the correct
      encryption key will be replaced by garbage, and the message cannot be
      decoded, but if the RSA decryption fails, the correct encryption key is
      used and the recipient will not notice the attack.
      
      As a work around for this potential attack the length of the decrypted
      key must be equal to the cipher default key length, in case the
      certifiate is not given and all recipientInfo are tried out.
      
      The old behaviour can be re-enabled in the CMS code by setting the
      CMS_DEBUG_DECRYPT flag.
      Reviewed-by: NMatt Caswell <matt@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/9777)
      
      (cherry picked from commit 5840ed0cd1e6487d247efbc1a04136a41d7b3a37)
      08229ad8
  2. 20 3月, 2018 1 次提交
  3. 13 3月, 2018 1 次提交
  4. 18 10月, 2017 1 次提交
  5. 17 10月, 2017 1 次提交
  6. 09 10月, 2017 1 次提交
  7. 29 6月, 2016 1 次提交
  8. 14 6月, 2016 1 次提交
  9. 18 5月, 2016 1 次提交
  10. 28 4月, 2016 1 次提交
  11. 27 1月, 2016 1 次提交
    • R
      Remove /* foo.c */ comments · 34980760
      Rich Salz 提交于
      This was done by the following
              find . -name '*.[ch]' | /tmp/pl
      where /tmp/pl is the following three-line script:
              print unless $. == 1 && m@/\* .*\.[ch] \*/@;
              close ARGV if eof; # Close file to reset $.
      
      And then some hand-editing of other files.
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      34980760
  12. 01 1月, 2016 1 次提交
  13. 08 12月, 2015 2 次提交
  14. 10 11月, 2015 1 次提交
  15. 24 10月, 2015 1 次提交
  16. 06 9月, 2015 1 次提交
  17. 11 6月, 2015 1 次提交
  18. 14 5月, 2015 1 次提交
  19. 11 5月, 2015 1 次提交
  20. 01 5月, 2015 3 次提交
  21. 28 3月, 2015 1 次提交
    • R
      free NULL cleanup · c5ba2d99
      Rich Salz 提交于
      EVP_.*free; this gets:
              EVP_CIPHER_CTX_free EVP_PKEY_CTX_free EVP_PKEY_asn1_free
              EVP_PKEY_asn1_set_free EVP_PKEY_free EVP_PKEY_free_it
              EVP_PKEY_meth_free; and also EVP_CIPHER_CTX_cleanup
      Reviewed-by: NKurt Roeckx <kurt@openssl.org>
      c5ba2d99
  22. 25 3月, 2015 2 次提交
  23. 23 3月, 2015 1 次提交
  24. 19 3月, 2015 1 次提交
    • E
      PKCS#7: avoid NULL pointer dereferences with missing content · c225c3cf
      Emilia Kasper 提交于
      In PKCS#7, the ASN.1 content component is optional.
      This typically applies to inner content (detached signatures),
      however we must also handle unexpected missing outer content
      correctly.
      
      This patch only addresses functions reachable from parsing,
      decryption and verification, and functions otherwise associated
      with reading potentially untrusted data.
      
      Correcting all low-level API calls requires further work.
      
      CVE-2015-0289
      
      Thanks to Michal Zalewski (Google) for reporting this issue.
      Reviewed-by: NSteve Henson <steve@openssl.org>
      c225c3cf
  25. 16 3月, 2015 1 次提交
  26. 31 1月, 2015 1 次提交
  27. 22 1月, 2015 1 次提交
  28. 08 5月, 2014 1 次提交
  29. 22 4月, 2014 1 次提交
  30. 06 9月, 2013 1 次提交
  31. 22 3月, 2012 1 次提交
  32. 13 3月, 2012 1 次提交
  33. 12 6月, 2010 1 次提交
  34. 24 9月, 2009 1 次提交
  35. 06 4月, 2007 1 次提交
  36. 05 4月, 2007 1 次提交