Commit Graph

138 Commits

Author SHA1 Message Date
christos 38f7168c16 PR/35965: Kazushi Marukawa: SSHD doesn't work under protocol 1
This is a manifestation of a bug in OpenSSL 0.9.8e, which breaks
certain ciphers in OpenSSH <= 4.5p1. See:
    http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/ssh2-aesctr-openssh.html
    http://bugzilla.mindrot.org/show_bug.cgi?id=1291
2007-03-10 17:18:31 +00:00
christos f0f7c41448 enable RFC/3779, requested by George Michaelson 2007-03-10 00:49:47 +00:00
dogcow 01abf44400 resolve the not-quite-resolved cvs conflicts (a missing #endif) 2007-03-07 02:34:59 +00:00
mjf d774015c29 resolve conflicts 2007-03-06 23:47:18 +00:00
mjf b22ff73a10 Import OpenSSL 0.9.8e 2007-03-06 21:12:00 +00:00
christos 17fe25abca eliminate caddr_t 2007-03-04 08:21:34 +00:00
dogcow ea8336c632 As uwe points out, it looks like the L on the version constant was
accidentally removed. Add it back, especially as the documentation still
claims that the constant is a long.
2006-11-14 22:30:33 +00:00
christos 600680c6c3 merge conflicts. 2006-11-13 21:55:36 +00:00
christos 4a5ea8ca2f import 0.9.8d 2006-11-13 21:16:04 +00:00
kardel f34e7857d3 keep len correct when substituting variables - fixes PR/24458 2006-10-08 22:21:14 +00:00
christos 8da6ea8890 Check for cert being NULL too. 2006-09-29 17:07:32 +00:00
christos 897b34d36d http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937
OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows
    remote attackers to cause a denial of service (inifnite loop
    and memory consumption) via malformed ASN.1 structures that
    trigger an improperly handled error condition.

http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940
    OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier
    versions allows attackers to cause a denial of service (CPU
    consumption) via certain public keys that require extra time
    to process.

http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738
    Buffer overflow in the SSL_get_shared_ciphers function in
    OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier
    versions has unspecified impact and remote attack vectors
    involving a long list of ciphers.

http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343
    Unspecified vulnerability in the SSLv2 client code in OpenSSL
    0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions
    allows remote servers to cause a denial of service (client
    crash) via unknown vectors.
2006-09-29 15:41:08 +00:00
adrianp 8d13789c5a Apply the third version of the patch from OpenSSL to address this issue.
- Rollback the updates for rsa.h, rsa_eay.c and rsa_err.c as they were
  not necessary to address this vulnerability.
- Small update to the patch for rsa_sign.c for backward compatability so
  the same patch can be applied to 0.9.[6-9]
2006-09-06 22:47:11 +00:00
christos 90f5d4a3e0 Apply patch-CVE-2006-4339.txt
Daniel Bleichenbacher recently described an attack on PKCS #1 v1.5
signatures. If an RSA key with exponent 3 is used it may be possible
to forge a PKCS #1 v1.5 signature signed by that key. Implementations
may incorrectly verify the certificate if they are not checking for
excess data in the RSA exponentiation result of the signature.

Since there are CAs using exponent 3 in wide use, and PKCS #1 v1.5 is
used in X.509 certificates, all software that uses OpenSSL to verify
X.509 certificates is potentially vulnerable, as well as any other use
of PKCS #1 v1.5. This includes software that uses OpenSSL for SSL or
TLS.
2006-09-05 12:24:08 +00:00
dogcow 444e690921 Remove various dotfiles that wandered their way in. 2006-06-18 08:59:39 +00:00
christos ed56312e8a resolve conflicts. 2006-06-03 01:50:19 +00:00
christos 387e0d89ab ftp www.openssl.org 2006-06-03 01:43:51 +00:00
christos b8b11c345a ftp www.openssl.org 2006-06-03 01:39:48 +00:00
oster 4f500646a9 Add a missing ')' to fix the example code. Already fixed in openssl upstream. 2006-05-24 16:44:34 +00:00
christos aa419ec271 enable cryptodev. 2005-12-31 00:08:34 +00:00
christos e1a76ccb7e netbsd has issetugid() 2005-12-31 00:07:26 +00:00
martin 07c3097258 Allow archs to override BF_PTR 2005-12-13 09:50:52 +00:00
martin 3804e42335 Back out bn/bn.h rev. 1.9:
> use explicitly sized types for U_LLONG U_LONG and LONG; otherwise bn
> breaks on 64 bit platforms. The "LONG" openssl wants is really a 32 bit int.

Instead define SIXTY_FOUR_BIT_LONG where apropriate.
Regression tests still pass on sparc64 and i386. Furthermore this allows
us to finaly close PR 28935 (thanks to christos for removing the local
hacks on last import).
2005-12-12 19:50:26 +00:00
christos cb9321f06d use intptr_t not U_LONG to cast from a pointer to an int. 2005-11-28 19:08:30 +00:00
christos bfae00e6c7 use explicitly sized types for U_LLONG U_LONG and LONG; otherwise bn
breaks on 64 bit platforms. The "LONG" openssl wants is really a 32 bit int.
2005-11-28 19:07:42 +00:00
christos b1d8541f7b Add casts. 2005-11-25 22:28:31 +00:00
christos 859fae516a change back to match the openssl original prototype. 2005-11-25 22:22:44 +00:00
christos 50a9cbc98b Resolve conflicts:
1. Instead of trying to cleanup the ugly ifdefs, we leave them alone so that
   there are going to be fewer conflicts in the future.
2. Where we make changes to override things #ifdef __NetBSD__ around them
   so that it is clear what we are changing. This is still missing in some
   places, notably in opensslconf.h because it would make things messier.
2005-11-25 19:14:11 +00:00
christos 8dc8acfeef from http://www.openssl.org/source 2005-11-25 03:02:45 +00:00
gendalia decff3d730 Add a preprocessor symbol so we can distinguish fixed openssl
from the vanilla openssl.  Thanks <jlam>.
2005-10-11 21:17:17 +00:00
gendalia ed304be38e fix openssl 2.0 rollback, CAN-2005-2969
approved by: agc
2005-10-11 18:07:40 +00:00
rpaulo e3886d37ea Add "openssl_" to man page references if they are available.
Fixes part of PR security/13953. Fixing the rest of the PR requires
adding more man pages.
2005-10-05 23:47:30 +00:00
elad 8f1a245ebd Use default_md = sha1 in ``req'' section too, so we don't fallback to MD5.
Noted by smb@.
2005-09-01 21:35:25 +00:00
elad 98e0d8f19f SHA1 is a better default than MD5.
Discussed with Steven M. Bellovin.
Closes PR/30395.
2005-08-27 12:32:15 +00:00
christos 1a191ad79e PR/29862: Denis Lagno: sshd segfaults with long keys
The problem was that the rsa fips validation code did not allocate long
enough buffers, so it was trashing the stack.
2005-07-30 00:38:40 +00:00
christos 31ed567522 resolve conflicts. 2005-04-23 19:31:14 +00:00
christos ed314b4eb0 from www.openssl.org 2005-04-23 19:10:56 +00:00
christos 55ef051c47 s/u_int32_t/uint32_t/
kill the rest of u32,u16,u8
2005-03-26 03:48:44 +00:00
christos 9b98d82f76 s/u32/u_int32_t/ 2005-03-26 02:23:06 +00:00
christos c6a84da3bd Don't define FIPS_selftest_failed locally. 2005-03-26 02:22:42 +00:00
christos 514fe26b5c The last broken merge. 2005-03-25 23:03:47 +00:00
christos 2674f87be1 Fix merge issue. 2005-03-25 21:54:20 +00:00
christos db19fc60e2 Missed 2 #ifdef OPENSSL_FIPS... 2005-03-25 20:19:51 +00:00
christos 684dfceb07 Resolve conflicts. 2005-03-25 20:14:24 +00:00
christos e72fb54032 import openssl-0.9.7f from ftp.openssl.org 2005-03-25 19:05:51 +00:00
onoe 9bd25f488a re-enable smime encrypt. fix from openssl-0.9.7e 2005-02-20 03:33:47 +00:00
drochner 14c8904f79 rename local pow10 function to avoid conflicts with the C99 libm one;
while not implemented in NetBSD yet is is considered reserved by gcc-3.4
2004-08-05 16:55:34 +00:00
drochner 5e420ba772 restore behaviour before the 0.9.7d import: fall back to /dev/urandom
if ~/.rnd is not present.
(This code is with #ifdef __OpenBSD__ in openssl now; this change just
generalizes it.)
(approved by tls)
2004-06-21 15:14:16 +00:00
groo 4b32eb44a7 Resolve conflicts. In particular, prefer OpenSSL's BIO_strl* and
BIO_strncpy over ours.
2004-03-20 04:32:34 +00:00
groo 5a374ad0ce Import OpenSSL 0.9.7d to address:
1. Null-pointer assignment during SSL handshake
	2. Out-of-bounds read affects Kerberos ciphersuites
2004-03-20 04:22:06 +00:00