Skip to content

Commit 37ddce5

Browse files
shigekirvagg
authored andcommittedAug 15, 2018
deps: upgrade openssl sources to 1.0.2p
This replaces all sources of openssl-1.0.2p.tar.gz into deps/openssl/openssl PR-URL: #22320 Reviewed-By: Rod Vagg <rod@vagg.org>
1 parent 0052926 commit 37ddce5

File tree

209 files changed

+2072
-39529
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

209 files changed

+2072
-39529
lines changed
 

‎deps/openssl/openssl/CHANGES

+58
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,64 @@
77
https://github.com/openssl/openssl/commits/ and pick the appropriate
88
release branch.
99

10+
Changes between 1.0.2o and 1.0.2p [14 Aug 2018]
11+
12+
*) Client DoS due to large DH parameter
13+
14+
During key agreement in a TLS handshake using a DH(E) based ciphersuite a
15+
malicious server can send a very large prime value to the client. This will
16+
cause the client to spend an unreasonably long period of time generating a
17+
key for this prime resulting in a hang until the client has finished. This
18+
could be exploited in a Denial Of Service attack.
19+
20+
This issue was reported to OpenSSL on 5th June 2018 by Guido Vranken
21+
(CVE-2018-0732)
22+
[Guido Vranken]
23+
24+
*) Cache timing vulnerability in RSA Key Generation
25+
26+
The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to
27+
a cache timing side channel attack. An attacker with sufficient access to
28+
mount cache timing attacks during the RSA key generation process could
29+
recover the private key.
30+
31+
This issue was reported to OpenSSL on 4th April 2018 by Alejandro Cabrera
32+
Aldaya, Billy Brumley, Cesar Pereida Garcia and Luis Manuel Alvarez Tapia.
33+
(CVE-2018-0737)
34+
[Billy Brumley]
35+
36+
*) Make EVP_PKEY_asn1_new() a bit stricter about its input. A NULL pem_str
37+
parameter is no longer accepted, as it leads to a corrupt table. NULL
38+
pem_str is reserved for alias entries only.
39+
[Richard Levitte]
40+
41+
*) Revert blinding in ECDSA sign and instead make problematic addition
42+
length-invariant. Switch even to fixed-length Montgomery multiplication.
43+
[Andy Polyakov]
44+
45+
*) Change generating and checking of primes so that the error rate of not
46+
being prime depends on the intended use based on the size of the input.
47+
For larger primes this will result in more rounds of Miller-Rabin.
48+
The maximal error rate for primes with more than 1080 bits is lowered
49+
to 2^-128.
50+
[Kurt Roeckx, Annie Yousar]
51+
52+
*) Increase the number of Miller-Rabin rounds for DSA key generating to 64.
53+
[Kurt Roeckx]
54+
55+
*) Add blinding to ECDSA and DSA signatures to protect against side channel
56+
attacks discovered by Keegan Ryan (NCC Group).
57+
[Matt Caswell]
58+
59+
*) When unlocking a pass phrase protected PEM file or PKCS#8 container, we
60+
now allow empty (zero character) pass phrases.
61+
[Richard Levitte]
62+
63+
*) Certificate time validation (X509_cmp_time) enforces stricter
64+
compliance with RFC 5280. Fractional seconds and timezone offsets
65+
are no longer allowed.
66+
[Emilia Käsper]
67+
1068
Changes between 1.0.2n and 1.0.2o [27 Mar 2018]
1169

1270
*) Constructed ASN.1 types with a recursive definition could exceed the stack

‎deps/openssl/openssl/CONTRIBUTING

+25-25
Original file line numberDiff line numberDiff line change
@@ -1,26 +1,26 @@
1-
HOW TO CONTRIBUTE PATCHES TO OpenSSL
2-
------------------------------------
1+
HOW TO CONTRIBUTE TO OpenSSL
2+
----------------------------
33

44
(Please visit https://www.openssl.org/community/getting-started.html for
55
other ideas about how to contribute.)
66

7-
Development is coordinated on the openssl-dev mailing list (see the
8-
above link or https://mta.openssl.org for information on subscribing).
9-
If you are unsure as to whether a feature will be useful for the general
10-
OpenSSL community you might want to discuss it on the openssl-dev mailing
11-
list first. Someone may be already working on the same thing or there
12-
may be a good reason as to why that feature isn't implemented.
7+
Development is done on GitHub, https://github.com/openssl/openssl.
138

14-
To submit a patch, make a pull request on GitHub. If you think the patch
15-
could use feedback from the community, please start a thread on openssl-dev
16-
to discuss it.
9+
To request new features or report bugs, please open an issue on GitHub
1710

18-
Having addressed the following items before the PR will help make the
19-
acceptance and review process faster:
11+
To submit a patch, please open a pull request on GitHub. If you are thinking
12+
of making a large contribution, open an issue for it before starting work,
13+
to get comments from the community. Someone may be already working on
14+
the same thing or there may be reasons why that feature isn't implemented.
2015

21-
1. Anything other than trivial contributions will require a contributor
22-
licensing agreement, giving us permission to use your code. See
23-
https://www.openssl.org/policies/cla.html for details.
16+
To make it easier to review and accept your pull request, please follow these
17+
guidelines:
18+
19+
1. Anything other than a trivial contribution requires a Contributor
20+
License Agreement (CLA), giving us permission to use your code. See
21+
https://www.openssl.org/policies/cla.html for details. If your
22+
contribution is too small to require a CLA, put "CLA: trivial" on a
23+
line by itself in your commit message body.
2424

2525
2. All source files should start with the following text (with
2626
appropriate comment characters at the start of each line and the
@@ -34,21 +34,21 @@ acceptance and review process faster:
3434
https://www.openssl.org/source/license.html
3535

3636
3. Patches should be as current as possible; expect to have to rebase
37-
often. We do not accept merge commits; You will be asked to remove
38-
them before a patch is considered acceptable.
37+
often. We do not accept merge commits, you will have to remove them
38+
(usually by rebasing) before it will be acceptable.
3939

4040
4. Patches should follow our coding style (see
41-
https://www.openssl.org/policies/codingstyle.html) and compile without
42-
warnings. Where gcc or clang is availble you should use the
41+
https://www.openssl.org/policies/codingstyle.html) and compile
42+
without warnings. Where gcc or clang is available you should use the
4343
--strict-warnings Configure option. OpenSSL compiles on many varied
44-
platforms: try to ensure you only use portable features.
45-
Clean builds via Travis and AppVeyor are expected, and done whenever
46-
a PR is created or updated.
44+
platforms: try to ensure you only use portable features. Clean builds
45+
via Travis and AppVeyor are required, and they are started automatically
46+
whenever a PR is created or updated.
4747

4848
5. When at all possible, patches should include tests. These can
4949
either be added to an existing test, or completely new. Please see
5050
test/README for information on the test framework.
5151

5252
6. New features or changed functionality must include
53-
documentation. Please look at the "pod" files in doc/apps, doc/crypto
54-
and doc/ssl for examples of our style.
53+
documentation. Please look at the "pod" files in doc for
54+
examples of our style.

0 commit comments

Comments
 (0)
Please sign in to comment.