[openssl-commits] [openssl] master update

2018-06-12 Thread Viktor Dukhovni
The branch master has been updated
   via  0df65d82dbc41e8da00adb243de5918db532c8a6 (commit)
  from  8fe4c0b001f85c5a918c6a6d4687813ea3d2945f (commit)


- Log -
commit 0df65d82dbc41e8da00adb243de5918db532c8a6
Author: Viktor Dukhovni 
Date:   Tue Jun 12 11:51:53 2018 -0400

Document return value of X509_add_ext

and also X509_delete_ext()

Reviewed-by: Matt Caswell 

---

Summary of changes:
 doc/man3/X509v3_get_ext_by_NID.pod | 6 --
 1 file changed, 4 insertions(+), 2 deletions(-)

diff --git a/doc/man3/X509v3_get_ext_by_NID.pod 
b/doc/man3/X509v3_get_ext_by_NID.pod
index 81c938e..54dff3c 100644
--- a/doc/man3/X509v3_get_ext_by_NID.pod
+++ b/doc/man3/X509v3_get_ext_by_NID.pod
@@ -115,8 +115,8 @@ initial extension will not be checked.
 
 X509v3_get_ext_count() returns the extension count.
 
-X509v3_get_ext() and X509v3_delete_ext() return an B pointer
-or B if an error occurs.
+X509v3_get_ext(), X509v3_delete_ext() and X509_delete_ext() return an
+B pointer or B if an error occurs.
 
 X509v3_get_ext_by_NID() X509v3_get_ext_by_OBJ() and
 X509v3_get_ext_by_critical() return the an extension index or B<-1> if an
@@ -124,6 +124,8 @@ error occurs.
 
 X509v3_add_ext() returns a stack of extensions or B on error.
 
+X509_add_ext() returns 1 on success and 0 on error.
+
 =head1 SEE ALSO
 
 L
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2018-06-12 Thread Matt Caswell
The branch master has been updated
   via  8fe4c0b001f85c5a918c6a6d4687813ea3d2945f (commit)
  from  3ccfcd8a851b49c7e4b1e40bb1d7ccd326e6f94f (commit)


- Log -
commit 8fe4c0b001f85c5a918c6a6d4687813ea3d2945f
Author: Nicola Tuveri 
Date:   Tue Jun 12 04:27:28 2018 +0300

Deprecate DSA_sign_setup() in the documentation

Reviewed-by: Rich Salz 
Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/openssl/pull/6460)

---

Summary of changes:
 doc/man3/DSA_sign.pod | 13 ++---
 1 file changed, 6 insertions(+), 7 deletions(-)

diff --git a/doc/man3/DSA_sign.pod b/doc/man3/DSA_sign.pod
index 458e16a..4ca7756 100644
--- a/doc/man3/DSA_sign.pod
+++ b/doc/man3/DSA_sign.pod
@@ -23,13 +23,12 @@ digest B using the private key B and places its 
ASN.1 DER
 encoding at B. The length of the signature is places in
 *B. B must point to DSA_size(B) bytes of memory.
 
-DSA_sign_setup() may be used to precompute part of the signing
-operation in case signature generation is time-critical. It expects
-B to contain DSA parameters. It places the precomputed values
-in newly allocated Bs at *B and *B, after freeing
-the old ones unless *B and *B are NULL. These values may
-be passed to DSA_sign() in Bkinv> and Br>.
-B is a pre-allocated B or NULL.
+DSA_sign_setup() is defined only for backward binary compatibility and
+should not be used.
+Since OpenSSL 1.1.0 the DSA type is opaque and the output of
+DSA_sign_setup() cannot be used anyway: calling this function will only
+cause overhead, and does not affect the actual signature
+(pre-)computation.
 
 DSA_verify() verifies that the signature B of size B
 matches a given message digest B of size B.
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_1_0-stable update

2018-06-12 Thread Matt Caswell
The branch OpenSSL_1_1_0-stable has been updated
   via  cd396d2a4767f186cc12e8c111599caeb35893bc (commit)
  from  ea7abeeabf92b7aca160bdd0208636d4da69f4f4 (commit)


- Log -
commit cd396d2a4767f186cc12e8c111599caeb35893bc
Author: Nicola Tuveri 
Date:   Tue Jun 12 04:27:28 2018 +0300

Deprecate DSA_sign_setup() in the documentation

Reviewed-by: Rich Salz 
Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/openssl/pull/6460)

(cherry picked from commit 8fe4c0b001f85c5a918c6a6d4687813ea3d2945f)

---

Summary of changes:
 doc/crypto/DSA_sign.pod | 13 ++---
 1 file changed, 6 insertions(+), 7 deletions(-)

diff --git a/doc/crypto/DSA_sign.pod b/doc/crypto/DSA_sign.pod
index ba0f6b8..2c50708 100644
--- a/doc/crypto/DSA_sign.pod
+++ b/doc/crypto/DSA_sign.pod
@@ -24,13 +24,12 @@ digest B using the private key B and places its 
ASN.1 DER
 encoding at B. The length of the signature is places in
 *B. B must point to DSA_size(B) bytes of memory.
 
-DSA_sign_setup() may be used to precompute part of the signing
-operation in case signature generation is time-critical. It expects
-B to contain DSA parameters. It places the precomputed values
-in newly allocated Bs at *B and *B, after freeing
-the old ones unless *B and *B are NULL. These values may
-be passed to DSA_sign() in Bkinv> and Br>.
-B is a pre-allocated B or NULL.
+DSA_sign_setup() is defined only for backward binary compatibility and
+should not be used.
+Since OpenSSL 1.1.0 the DSA type is opaque and the output of
+DSA_sign_setup() cannot be used anyway: calling this function will only
+cause overhead, and does not affect the actual signature
+(pre-)computation.
 
 DSA_verify() verifies that the signature B of size B
 matches a given message digest B of size B.
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

2018-06-12 Thread Matt Caswell
The branch master has been updated
   via  b89fd121a046015bb70865060d6cf7f3268b36f0 (commit)
  from  81d4522dd877e11b558579fdb89b447cf95606bb (commit)


- Log -
commit b89fd121a046015bb70865060d6cf7f3268b36f0
Author: Matt Caswell 
Date:   Tue Jun 12 13:10:13 2018 +0100

Fix advisory link

Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/web/pull/59)

---

Summary of changes:
 news/vulnerabilities.xml | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/news/vulnerabilities.xml b/news/vulnerabilities.xml
index 145e1ef..97f818b 100644
--- a/news/vulnerabilities.xml
+++ b/news/vulnerabilities.xml
@@ -51,7 +51,7 @@
 generating a key for this prime resulting in a hang until the client 
has
 finished. This could be exploited in a Denial Of Service attack.
 
-
+
 
   
   
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Jenkins build is back to normal : master_make_errors #566

2018-06-12 Thread osslsanity
See 


_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2018-06-12 Thread Richard Levitte
The branch master has been updated
   via  3ccfcd8a851b49c7e4b1e40bb1d7ccd326e6f94f (commit)
   via  caf12bd6754987d99b9e27f2422136a48e53cc86 (commit)
   via  aa6cc8d33c107c8b6d2e9bbffe52086e191f607b (commit)
   via  b9def672b123ce3d1102683f13c61bc68a07c5b0 (commit)
  from  91f7361f47b082ae61ffe1a7b17bb2adf213c7fe (commit)


- Log -
commit 3ccfcd8a851b49c7e4b1e40bb1d7ccd326e6f94f
Author: Richard Levitte 
Date:   Tue Jun 12 09:27:18 2018 +0200

Make ck_errf.pl ignore commented out error generation

Reviewed-by: Tim Hudson 
(Merged from https://github.com/openssl/openssl/pull/6461)

commit caf12bd6754987d99b9e27f2422136a48e53cc86
Author: Richard Levitte 
Date:   Tue Jun 12 08:57:43 2018 +0200

.travis.yml: give make update exit code meaning again

Reviewed-by: Tim Hudson 
(Merged from https://github.com/openssl/openssl/pull/6461)

commit aa6cc8d33c107c8b6d2e9bbffe52086e191f607b
Author: Richard Levitte 
Date:   Tue Jun 12 08:56:21 2018 +0200

make errors: use the new util/ck_errf.pl options

Reviewed-by: Tim Hudson 
(Merged from https://github.com/openssl/openssl/pull/6461)

commit b9def672b123ce3d1102683f13c61bc68a07c5b0
Author: Richard Levitte 
Date:   Tue Jun 12 08:53:14 2018 +0200

util/ck_errf.pl: add functionality that brings it closer to util/mkerr.pl

There was no option to give other config files than the default
crypto/err/openssl.ec, and yet it tried to check the errors generated
in engines (and failing, of course).

Also added the same '-internal' option as util/mkerr.pl.

Reviewed-by: Tim Hudson 
(Merged from https://github.com/openssl/openssl/pull/6461)

---

Summary of changes:
 .travis.yml   |  4 +-
 Configurations/unix-Makefile.tmpl |  8 ++--
 crypto/srp/srp_vfy.c  |  2 +-
 util/ck_errf.pl   | 78 ++-
 4 files changed, 76 insertions(+), 16 deletions(-)

diff --git a/.travis.yml b/.travis.yml
index 7092953..34ccf80 100644
--- a/.travis.yml
+++ b/.travis.yml
@@ -186,8 +186,8 @@ script:
   echo -e '+\057 MAKE UPDATE OK';
   else
   echo -e '+\057 MAKE UPDATE FAILED'; false;
-  fi;
-  git diff --exit-code
+  fi
+- git diff --exit-code
 - if [ -n "$CHECKDOCS" ]; then
   if $make doc-nits; then
   echo -e '+\057\057 MAKE DOC-NITS OK';
diff --git a/Configurations/unix-Makefile.tmpl 
b/Configurations/unix-Makefile.tmpl
index 4451232..10deec6 100644
--- a/Configurations/unix-Makefile.tmpl
+++ b/Configurations/unix-Makefile.tmpl
@@ -760,11 +760,13 @@ generate_fuzz_oids:
 # Set to -force to force a rebuild
 ERROR_REBUILD=
 errors:
-   ( cd $(SRCDIR); $(PERL) util/ck_errf.pl -strict */*.c */*/*.c )
-   ( b=`pwd`; cd $(SRCDIR); \
+   ( b=`pwd`; set -e; cd $(SRCDIR); \
+  $(PERL) util/ck_errf.pl -strict -internal; \
   $(PERL) -I$$b util/mkerr.pl $(ERROR_REBUILD) -internal )
-   ( b=`pwd`; cd $(SRCDIR)/engines; \
+   ( b=`pwd`; set -e; cd $(SRCDIR)/engines; \
   for E in *.ec ; do \
+  $(PERL) ../util/ck_errf.pl -strict \
+-conf $$E `basename $$E .ec`.c; \
   $(PERL) -I$$b ../util/mkerr.pl $(ERROR_REBUILD) -static \
 -conf $$E `basename $$E .ec`.c ; \
   done )
diff --git a/crypto/srp/srp_vfy.c b/crypto/srp/srp_vfy.c
index b13c006..17b35c0 100644
--- a/crypto/srp/srp_vfy.c
+++ b/crypto/srp/srp_vfy.c
@@ -189,7 +189,7 @@ static SRP_user_pwd *SRP_user_pwd_new(void)
 SRP_user_pwd *ret;
 
 if ((ret = OPENSSL_malloc(sizeof(*ret))) == NULL) {
-/* SRPerr(SRP_F_SRP_USER_PWD_NEW, ERR_R_MALLOC_FAILURE); */
+/* SRPerr(SRP_F_SRP_USER_PWD_NEW, ERR_R_MALLOC_FAILURE); */ 
/*ckerr_ignore*/
 return NULL;
 }
 ret->N = NULL;
diff --git a/util/ck_errf.pl b/util/ck_errf.pl
index a078427..138dfb9 100755
--- a/util/ck_errf.pl
+++ b/util/ck_errf.pl
@@ -16,15 +16,75 @@
 use strict;
 use warnings;
 
+my $config;
 my $err_strict = 0;
-my $bad= 0;
+my $debug  = 0;
+my $internal   = 0;
+
+sub help
+{
+print STDERR <<"EOF";
+mkerr.pl [options] [files...]
+
+Options:
+
+-conf FILE  Use the named config file FILE instead of the default.
+
+-debug  Verbose output debugging on stderr.
+
+-internal   Generate code that is to be built as part of OpenSSL itself.
+Also scans internal list of files.
+
+-strict If any error was found, fail with exit code 1, otherwise 0.
+
+-help   Show this help text.
+
+... Additional arguments are added to the file list to scan,
+if '-internal' was NOT specified on the command line.
+
+EOF
+}
+
+while ( @ARGV ) {
+my $arg = $ARGV[0];
+last unless $arg =~ /-.*/;
+$arg = $1 if $arg =~ 

[openssl-commits] [web] master update

2018-06-12 Thread Matt Caswell
The branch master has been updated
   via  81d4522dd877e11b558579fdb89b447cf95606bb (commit)
  from  d04d28a092b7489bfe3831aa69e20ddc87b28bfa (commit)


- Log -
commit 81d4522dd877e11b558579fdb89b447cf95606bb
Author: Matt Caswell 
Date:   Tue Jun 12 10:25:31 2018 +0100

Updates for CVE-2018-0732

Reviewed-by: Tim Hudson 
(Merged from https://github.com/openssl/web/pull/58)

---

Summary of changes:
 news/newsflash.txt   |  1 +
 news/secadv/20180612.txt | 35 +++
 news/vulnerabilities.xml | 48 +++-
 3 files changed, 83 insertions(+), 1 deletion(-)
 create mode 100644 news/secadv/20180612.txt

diff --git a/news/newsflash.txt b/news/newsflash.txt
index cba57e2..ce931be 100644
--- a/news/newsflash.txt
+++ b/news/newsflash.txt
@@ -4,6 +4,7 @@
 # Format is two fields, colon-separated; the first line is the column
 # headings.  URL paths must all be absolute.
 Date: Item
+12-Jun-2018: Security Advisory: one 
low severity fix
 29-May-2018: Beta 5 of OpenSSL 1.1.1 (pre release 7) is now available: please 
download and test it
 01-May-2018: Beta 4 of OpenSSL 1.1.1 is now available: please download and 
test it
 17-Apr-2018: Beta 3 of OpenSSL 1.1.1 is now available: please download and 
test it
diff --git a/news/secadv/20180612.txt b/news/secadv/20180612.txt
new file mode 100644
index 000..1864ace
--- /dev/null
+++ b/news/secadv/20180612.txt
@@ -0,0 +1,35 @@
+
+OpenSSL Security Advisory [12 June 2018]
+
+
+Client DoS due to large DH parameter (CVE-2018-0732)
+
+
+Severity: Low
+
+During key agreement in a TLS handshake using a DH(E) based ciphersuite a
+malicious server can send a very large prime value to the client. This will
+cause the client to spend an unreasonably long period of time generating a key
+for this prime resulting in a hang until the client has finished. This could be
+exploited in a Denial Of Service attack.
+
+Due to the low severity of this issue we are not issuing a new release of
+OpenSSL 1.1.0 or 1.0.2 at this time. The fix will be included in OpenSSL 1.1.0i
+and OpenSSL 1.0.2p when they become available. The fix is also available in
+commit ea7abeeab (for 1.1.0) and commit 3984ef0b7 (for 1.0.2) in the OpenSSL 
git
+repository.
+
+This issue was reported to OpenSSL on 5th June 2018 by Guido Vranken who also
+developed the fix.
+
+References
+==
+
+URL for this Security Advisory:
+https://www.openssl.org/news/secadv/20180612.txt
+
+Note: the online version of the advisory may be updated with additional details
+over time.
+
+For details of OpenSSL severity classifications please see:
+https://www.openssl.org/policies/secpolicy.html
diff --git a/news/vulnerabilities.xml b/news/vulnerabilities.xml
index bb13b7f..145e1ef 100644
--- a/news/vulnerabilities.xml
+++ b/news/vulnerabilities.xml
@@ -7,7 +7,53 @@
 
 
-
+
+  
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+  
+
+
+  
+
+Client side Denial of Service
+Client DoS due to large DH parameter
+
+During key agreement in a TLS handshake using a DH(E) based ciphersuite
+a malicious server can send a very large prime value to the client. 
This
+will cause the client to spend an unreasonably long period of time
+generating a key for this prime resulting in a hang until the client 
has
+finished. This could be exploited in a Denial Of Service attack.
+
+
+
+  
   
 
 
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_0_2-stable update

2018-06-12 Thread Matt Caswell
The branch OpenSSL_1_0_2-stable has been updated
   via  3984ef0b72831da8b3ece4745cac4f8575b19098 (commit)
  from  bd45a8d1ef338027e6892a7c886a373a4fafbf7d (commit)


- Log -
commit 3984ef0b72831da8b3ece4745cac4f8575b19098
Author: Guido Vranken 
Date:   Mon Jun 11 19:38:54 2018 +0200

Reject excessively large primes in DH key generation.

CVE-2018-0732

Signed-off-by: Guido Vranken 

(cherry picked from commit 91f7361f47b082ae61ffe1a7b17bb2adf213c7fe)

Reviewed-by: Tim Hudson 
Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/openssl/pull/6457)

---

Summary of changes:
 crypto/dh/dh_key.c | 7 ++-
 1 file changed, 6 insertions(+), 1 deletion(-)

diff --git a/crypto/dh/dh_key.c b/crypto/dh/dh_key.c
index 387558f..f235e0d 100644
--- a/crypto/dh/dh_key.c
+++ b/crypto/dh/dh_key.c
@@ -130,10 +130,15 @@ static int generate_key(DH *dh)
 int ok = 0;
 int generate_new_key = 0;
 unsigned l;
-BN_CTX *ctx;
+BN_CTX *ctx = NULL;
 BN_MONT_CTX *mont = NULL;
 BIGNUM *pub_key = NULL, *priv_key = NULL;
 
+if (BN_num_bits(dh->p) > OPENSSL_DH_MAX_MODULUS_BITS) {
+DHerr(DH_F_GENERATE_KEY, DH_R_MODULUS_TOO_LARGE);
+return 0;
+}
+
 ctx = BN_CTX_new();
 if (ctx == NULL)
 goto err;
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_1_0-stable update

2018-06-12 Thread Matt Caswell
The branch OpenSSL_1_1_0-stable has been updated
   via  ea7abeeabf92b7aca160bdd0208636d4da69f4f4 (commit)
  from  9a236d5a7158d38b933656cacc31dfd4ff4fcc08 (commit)


- Log -
commit ea7abeeabf92b7aca160bdd0208636d4da69f4f4
Author: Guido Vranken 
Date:   Mon Jun 11 19:38:54 2018 +0200

Reject excessively large primes in DH key generation.

CVE-2018-0732

Signed-off-by: Guido Vranken 

(cherry picked from commit 91f7361f47b082ae61ffe1a7b17bb2adf213c7fe)

Reviewed-by: Tim Hudson 
Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/openssl/pull/6457)

---

Summary of changes:
 crypto/dh/dh_key.c | 7 ++-
 1 file changed, 6 insertions(+), 1 deletion(-)

diff --git a/crypto/dh/dh_key.c b/crypto/dh/dh_key.c
index fce9ff4..58003d7 100644
--- a/crypto/dh/dh_key.c
+++ b/crypto/dh/dh_key.c
@@ -78,10 +78,15 @@ static int generate_key(DH *dh)
 int ok = 0;
 int generate_new_key = 0;
 unsigned l;
-BN_CTX *ctx;
+BN_CTX *ctx = NULL;
 BN_MONT_CTX *mont = NULL;
 BIGNUM *pub_key = NULL, *priv_key = NULL;
 
+if (BN_num_bits(dh->p) > OPENSSL_DH_MAX_MODULUS_BITS) {
+DHerr(DH_F_GENERATE_KEY, DH_R_MODULUS_TOO_LARGE);
+return 0;
+}
+
 ctx = BN_CTX_new();
 if (ctx == NULL)
 goto err;
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed in Jenkins: master_make_errors #565

2018-06-12 Thread osslsanity
See 


Changes:

[levitte] util/ck_errf.pl: add detection of unknown libcrypto and libssl libs

[matt] Reject excessively large primes in DH key generation.

--
Started by upstream project "master_basic" build number 576
originally caused by:
 Started by an SCM change
Building in workspace 

[WS-CLEANUP] Deleting project workspace...
[WS-CLEANUP] Done
Cloning the remote Git repository
Cloning repository https://github.com/openssl/openssl.git
 > git init 
 > 
 >  # timeout=10
Fetching upstream changes from https://github.com/openssl/openssl.git
 > git --version # timeout=10
 > git fetch --tags --progress https://github.com/openssl/openssl.git 
 > +refs/heads/*:refs/remotes/origin/*
 > git config remote.origin.url https://github.com/openssl/openssl.git # 
 > timeout=10
 > git config --add remote.origin.fetch +refs/heads/*:refs/remotes/origin/* # 
 > timeout=10
 > git config remote.origin.url https://github.com/openssl/openssl.git # 
 > timeout=10
Fetching upstream changes from https://github.com/openssl/openssl.git
 > git fetch --tags --progress https://github.com/openssl/openssl.git 
 > +refs/heads/*:refs/remotes/origin/*
 > git rev-parse refs/remotes/origin/master^{commit} # timeout=10
 > git rev-parse refs/remotes/origin/origin/master^{commit} # timeout=10
Checking out Revision 91f7361f47b082ae61ffe1a7b17bb2adf213c7fe 
(refs/remotes/origin/master)
 > git config core.sparsecheckout # timeout=10
 > git checkout -f 91f7361f47b082ae61ffe1a7b17bb2adf213c7fe
 > git rev-list fa92c69aafc40a87c9b0dded9c365348a8ac4b33 # timeout=10
[master_make_errors] $ /bin/sh -xe /tmp/jenkins2400646188663886536.sh
+ ./config
Operating system: x86_64-whatever-linux2
Configuring OpenSSL version 1.1.1-pre8-dev (0x10101008L) for linux-x86_64
Using os-specific seed configuration
Creating configdata.pm
Creating Makefile

**
******
***   If you want to report a building issue, please include the   ***
***   output from this command:***
******
*** perl configdata.pm --dump  ***
******
**
+ make depend
+ make errors
( cd .; /usr/bin/perl util/ck_errf.pl -strict */*.c */*/*.c )
FATAL: error discrepancy
engines/e_afalg.c:165:AFALG unknown
engines/e_afalg.c:189:AFALG unknown
engines/e_afalg.c:207:AFALG unknown
engines/e_afalg.c:356:AFALG unknown
engines/e_afalg.c:380:AFALG unknown
engines/e_afalg.c:387:AFALG unknown
engines/e_afalg.c:394:AFALG unknown
engines/e_afalg.c:722:AFALG unknown
engines/e_afalg.c:733:AFALG unknown
engines/e_afalg.c:739:AFALG unknown
engines/e_afalg.c:775:AFALG unknown
engines/e_afalg.c:792:AFALG unknown
engines/e_afalg.c:800:AFALG unknown
engines/e_capi.c:290:CAPI unknown
engines/e_capi.c:296:CAPI unknown
engines/e_capi.c:323:CAPI unknown
engines/e_capi.c:350:CAPI unknown
engines/e_capi.c:370:CAPI unknown
engines/e_capi.c:386:CAPI unknown
engines/e_capi.c:489:CAPI unknown
engines/e_capi.c:637:CAPI unknown
engines/e_capi.c:648:CAPI unknown
engines/e_capi.c:655:CAPI unknown
engines/e_capi.c:667:CAPI unknown
engines/e_capi.c:713:CAPI unknown
engines/e_capi.c:760:CAPI unknown
engines/e_capi.c:778:CAPI unknown
engines/e_capi.c:792:CAPI unknown
engines/e_capi.c:814:CAPI unknown
engines/e_capi.c:835:CAPI unknown
engines/e_capi.c:867:CAPI unknown
engines/e_capi.c:875:CAPI unknown
engines/e_capi.c:882:CAPI unknown
engines/e_capi.c:890:CAPI unknown
engines/e_capi.c:931:CAPI unknown
engines/e_capi.c:938:CAPI unknown
engines/e_capi.c:945:CAPI unknown
engines/e_capi.c:954:CAPI unknown
engines/e_capi.c:995:CAPI unknown
engines/e_capi.c:1000:CAPI unknown
engines/e_capi.c:1006:CAPI unknown
engines/e_capi.c:1013:CAPI unknown
engines/e_capi.c:1021:CAPI unknown
engines/e_capi.c:1065:CAPI unknown
engines/e_capi.c:1102:CAPI unknown
engines/e_capi.c:1107:CAPI unknown
engines/e_capi.c:1112:CAPI unknown
engines/e_capi.c:1128:CAPI unknown
engines/e_capi.c:1134:CAPI unknown
engines/e_capi.c:1142:CAPI unknown
engines/e_capi.c:1197:CAPI unknown
engines/e_capi.c:1204:CAPI unknown
engines/e_capi.c:1211:CAPI unknown
engines/e_capi.c:1221:CAPI unknown
engines/e_capi.c:1238:CAPI unknown
engines/e_capi.c:1272:CAPI unknown
engines/e_capi.c:1277:CAPI unknown
engines/e_capi.c:1327:CAPI unknown
engines/e_capi.c:1389:CAPI unknown
engines/e_capi.c:1496:CAPI unknown
engines/e_capi.c:1501:CAPI unknown
engines/e_capi.c:1590:CAPI 

[openssl-commits] [openssl] master update

2018-06-12 Thread Matt Caswell
The branch master has been updated
   via  91f7361f47b082ae61ffe1a7b17bb2adf213c7fe (commit)
  from  a21180b70f6372fee836557df187d72f7a91b686 (commit)


- Log -
commit 91f7361f47b082ae61ffe1a7b17bb2adf213c7fe
Author: Guido Vranken 
Date:   Mon Jun 11 19:38:54 2018 +0200

Reject excessively large primes in DH key generation.

CVE-2018-0732

Signed-off-by: Guido Vranken 

Reviewed-by: Matthias St. Pierre 
Reviewed-by: Viktor Dukhovni 
Reviewed-by: Rich Salz 
Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/openssl/pull/6457)

---

Summary of changes:
 crypto/dh/dh_key.c | 7 ++-
 1 file changed, 6 insertions(+), 1 deletion(-)

diff --git a/crypto/dh/dh_key.c b/crypto/dh/dh_key.c
index 6901548..752542b 100644
--- a/crypto/dh/dh_key.c
+++ b/crypto/dh/dh_key.c
@@ -78,10 +78,15 @@ static int generate_key(DH *dh)
 int ok = 0;
 int generate_new_key = 0;
 unsigned l;
-BN_CTX *ctx;
+BN_CTX *ctx = NULL;
 BN_MONT_CTX *mont = NULL;
 BIGNUM *pub_key = NULL, *priv_key = NULL;
 
+if (BN_num_bits(dh->p) > OPENSSL_DH_MAX_MODULUS_BITS) {
+DHerr(DH_F_GENERATE_KEY, DH_R_MODULUS_TOO_LARGE);
+return 0;
+}
+
 ctx = BN_CTX_new();
 if (ctx == NULL)
 goto err;
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

2018-06-12 Thread Richard Levitte
The branch master has been updated
   via  d04d28a092b7489bfe3831aa69e20ddc87b28bfa (commit)
  from  8241c47b948d2213e8cead94844fd23207716499 (commit)


- Log -
commit d04d28a092b7489bfe3831aa69e20ddc87b28bfa
Author: Richard Levitte 
Date:   Tue Jun 12 09:19:01 2018 +0200

Emilia Käsper has left us

---

Summary of changes:
 community/omc-alumni.html | 5 +
 community/omc.html| 7 ---
 2 files changed, 5 insertions(+), 7 deletions(-)

diff --git a/community/omc-alumni.html b/community/omc-alumni.html
index 2f1fbd7..0581a62 100644
--- a/community/omc-alumni.html
+++ b/community/omc-alumni.html
@@ -38,6 +38,11 @@

 

+ Emilia Ksper
+ CH
+   
+
+   
  Nils Larsch
  DE

diff --git a/community/omc.html b/community/omc.html
index 6678dc7..dd78706 100644
--- a/community/omc.html
+++ b/community/omc.html
@@ -59,13 +59,6 @@
   
href="http://pool.sks-keyservers.net:11371/pks/lookup?op=get=0xC1F33DD8CE1D4CC613AF14DA9195C48241FBF7DD;>C1F3
 3DD8 CE1D 4CC6 13AF 14DA 9195 C482 41FB F7DD
 
 
-   
- Emilia Ksper
- mailto:emi...@openssl.org;>emi...@openssl.org
- CH
- 
-   
-
 
   Richard Levitte
   mailto:levi...@openssl.org;>levi...@openssl.org
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits