mirror of https://github.com/openssl/openssl.git
crypto: evp: fix potential null pointer dereference in EVP_DigestSignUpdate in m_sigver.c
#5841:Commit
daa004d484
pushed by
root
Backport of the fix #27506 (empty IDP causes error) to the version 3.5.
#5742:Commit
9ed6d025ae
pushed by
root
Fixed #27506, now the behavior with an empty IDN is the same as with
#5706:Commit
44ef69cffb
pushed by
root
Add a test of 'openssl storeutl' with a BER-encoded PKCS#12 file
#5689:Commit
8da644dc84
pushed by
root
Add a test of 'openssl storeutl' with a BER-encoded PKCS#12 file
#5680:Commit
454d7781eb
pushed by
root
Add a test of 'openssl storeutl' with a BER-encoded PKCS#12 file
#5671:Commit
86f8fc5f1b
pushed by
root
Add a test of 'openssl storeutl' with a BER-encoded PKCS#12 file
#5662:Commit
1d846ee63c
pushed by
root
Add a test of 'openssl storeutl' with a BER-encoded PKCS#12 file
#5644:Commit
49f8db5327
pushed by
root
sm2: sm2_sign.c: check EC_KEY_get0_private_key() for NULL in sm2_sig_gen()
#5616:Commit
7cac923066
pushed by
root
sm2: sm2_sign.c: check EC_KEY_get0_private_key() for NULL in sm2_sig_gen()
#5607:Commit
9cc261ccb4
pushed by
root
sm2: sm2_sign.c: check EC_KEY_get0_private_key() for NULL in sm2_sig_gen()
#5598:Commit
c85a5095c3
pushed by
root
sm2: sm2_sign.c: check EC_KEY_get0_private_key() for NULL in sm2_sig_gen()
#5589:Commit
93bf938cba
pushed by
root
sm2: sm2_sign.c: check EC_KEY_get0_private_key() for NULL in sm2_sig_gen()
#5571:Commit
c108ead284
pushed by
root
Raise PROV_R_NULL_OUTPUT_BUFFER if shsec is NULL in ml_kem_encapsulate()
#5446:Commit
96e7ac3500
pushed by
root
Raise PROV_R_NULL_OUTPUT_BUFFER if shsec is NULL in ml_kem_encapsulate()
#5437:Commit
5d0c6c52e7
pushed by
root
providers/implementations/digests/sha3_prov.c optimize ossl_(un)likely
#5304:Commit
704a2108ab
pushed by
root
Revert changes to ssl_version_cmp() to avoid calling assert on non-sane inputs
#5101:Commit
a3097c41b0
pushed by
root
Introduce SSL_OP_SERVER_PREFERENCE to replace SSL_OP_CIPHER_SERVER_PREFERENCE misnomer
#5034:Commit
51ce5499f9
pushed by
root
The check-ansi job is failing in the openssl-3.5 branch as a result of commit 60775e3. Fix that.
#4931:Commit
96fa08c6a5
pushed by
root
The check-ansi job is failing in the openssl-3.5 branch as a result of commit 60775e3. Fix that.
#4922:Commit
0d5c776694
pushed by
root
test/bio_pw_callback_test.c: Add BIO_free() to avoid memory leak
#4770:Commit
2ad09ef413
pushed by
root
fix: msg callback in dtls1_do_write that incorrectly shows message (like a certificate) that spans over multiple fragments.
#4731:Commit
42f5471e62
pushed by
root
fix: msg callback in dtls1_do_write that incorrectly shows message (like a certificate) that spans over multiple fragments.
#4722:Commit
7bd5c27a8b
pushed by
root
speed: Increase MAX_SIG_NUM and fix its usage in loopargs_t fields
#4615:Commit
28a0b9c797
pushed by
root
speed: Increase MAX_SIG_NUM and fix its usage in loopargs_t fields
#4606:Commit
29e0898448
pushed by
root
speed: Increase MAX_SIG_NUM and fix its usage in loopargs_t fields
#4597:Commit
7bdc0d13d2
pushed by
root
eddsa: convert to using struct based TRIE decoder for params processing
#4581:Commit
2e1b046d9a
pushed by
root
init_master_key(): Check return of CRYPTO_THREAD_init_local()
#4572:Commit
c45ab5b8de
pushed by
root
Fix exit code for s_time when -new command line switch specified
#4503:Commit
f6be9aedb0
pushed by
root
Fix exit code for s_time when -new command line switch specified
#4493:Commit
7976a42c45
pushed by
root
Fix exit code for s_time when -new command line switch specified
#4484:Commit
e49d915d2d
pushed by
root
Fix exit code for s_time when -new command line switch specified
#4475:Commit
49ad74a484
pushed by
root
Fix exit code for s_time when -new command line switch specified
#4457:Commit
b6ff559853
pushed by
root
Ensure we pass the user SSL object for the SSL_set_verify callback
#4397:Commit
d86a758bf1
pushed by
root
test/evp_extra_test.c: Add OPENSSL_free() to avoid memory leak if EVP_PKEY_CTX_set0_rsa_oaep_label() fails
#4348:Commit
d9b0230460
pushed by
root
s390x: Fix HMAC to fail update or final call when already finalized
#4190:Commit
9997b415e9
pushed by
root
s390x: Fix HMAC to fail update or final call when already finalized
#4181:Commit
659f40622b
pushed by
root
s390x: Fix HMAC to fail update or final call when already finalized
#4172:Commit
339ced70da
pushed by
root
crypto/evp/ctrl_params_translate.c: prevent clashes of generic names NONE, GET, SET
#4003:Commit
4e2e155e18
pushed by
root
crypto/evp/ctrl_params_translate.c: prevent clashes of generic names NONE, GET, SET
#3953:Commit
c37b9e3425
pushed by
root
Add a test to confirm that we can repeatedly create and destroy keys
#3929:Commit
6d4b760d3d
pushed by
root
Add a test to confirm that we can repeatedly create and destroy keys
#3920:Commit
1ad83cc104
pushed by
root
Add a test to confirm that we can repeatedly create and destroy keys
#3911:Commit
538bda44f1
pushed by
root
Add a test to confirm that we can repeatedly create and destroy keys
#3902:Commit
54acfafeff
pushed by
root
Add a test to confirm that we can repeatedly create and destroy keys
#3893:Commit
b994ce4088
pushed by
root
Reset qtls->local_transport_params_consumed to 0 on SSL_clear()
#3695:Commit
61ff9d94b3
pushed by
root
Reset qtls->local_transport_params_consumed to 0 on SSL_clear()
#3650:Commit
9bad2b86e8
pushed by
root
DOC: update references to obsolete RFC 2459 (updated by RFC 5280 and DSA parts taken over by RFC 3370)
#3634:Commit
7c6d9da45f
pushed by
root
initial implementation of http/1.0 server to benchmark OpenSSL QUIC
#3603:Commit
f426dd1311
pushed by
root
test/evp_test.c: Free fetched_digest on error to avoid memory leak
#3491:Commit
01280178ae
pushed by
root
test/evp_test.c: Free fetched_digest on error to avoid memory leak
#3482:Commit
9d4cbf0455
pushed by
root
test/evp_test.c: Free fetched_digest on error to avoid memory leak
#3473:Commit
7515e01e6e
pushed by
root
test/evp_test.c: Free fetched_digest on error to avoid memory leak
#3464:Commit
9647fbad35
pushed by
root
test/evp_test.c: Free fetched_digest on error to avoid memory leak
#3446:Commit
e8deb32af4
pushed by
root
crypto/pkcs7/pk7_smime.c: Add BIO_free() to avoid memory leak
#3357:Commit
2658aa5ad3
pushed by
root
crypto/pkcs7/pk7_smime.c: Add BIO_free() to avoid memory leak
#3348:Commit
a381691377
pushed by
root
Fix memory leaks after failure of PKCS7_add_signed_attribute()
#3274:Commit
4f1a815951
pushed by
root
Fix memory leaks after failure of PKCS7_add_signed_attribute()
#3265:Commit
4234c3a97f
pushed by
root
Fix memory leaks after failure of PKCS7_add_signed_attribute()
#3256:Commit
976a771cb9
pushed by
root
apps/x509.c: Fix the -addreject option adding trust instead of rejection
#3166:Commit
e96d22446e
pushed by
root
crypto/evp/signature.c: add checks for consistent presence of 'update' and 'final' functions
#3141:Commit
1b20579d5c
pushed by
root
APPS/x509: add -multi option for outputting all certs found in input
#2809:Commit
dca67c0aa1
pushed by
root
d2i_X509.pod: add missing doc of return value of i2d_ASN1_bio_stream()
#2799:Commit
913ee3af63
pushed by
root
test/testutil/testutil_init.c: Add OPENSSL_free() to avoid memory leak
#2764:Commit
4175b823ac
pushed by
root
test/testutil/testutil_init.c: Add OPENSSL_free() to avoid memory leak
#2755:Commit
6ab4e07c3e
pushed by
root
test/testutil/testutil_init.c: Add OPENSSL_free() to avoid memory leak
#2746:Commit
e0b3ddfc01
pushed by
root
test/testutil/testutil_init.c: Add OPENSSL_free() to avoid memory leak
#2737:Commit
f2b47d138f
pushed by
root
Raise an error if PBKDF2 iteration count set to zero on check disabled in default provider
#2710:Commit
53ea500c49
pushed by
root
test/bio_comp_test.c: Initialize pointer to avoid undefined behavior
#2595:Commit
aac068aeae
pushed by
root
test/bio_comp_test.c: Initialize pointer to avoid undefined behavior
#2586:Commit
2afa23acf9
pushed by
root
test/bio_comp_test.c: Initialize pointer to avoid undefined behavior
#2577:Commit
d77ad352d9
pushed by
root
test/bio_comp_test.c: Initialize pointer to avoid undefined behavior
#2568:Commit
2e7020b4e9
pushed by
root