[openssl] OpenSSL_1_1_0k create

Richard Levitte levitte at openssl.org
Tue May 28 13:19:17 UTC 2019


The annotated tag OpenSSL_1_1_0k has been created
        at  aa582f5009d8fc88be277d19978e5e8a79febbab (tag)
   tagging  fb83aaf6a163438149570b344c6c75a6aa977ae9 (commit)
  replaces  OpenSSL_1_1_0j
 tagged by  Richard Levitte
        on  Tue May 28 14:59:16 2019 +0200

- Log -----------------------------------------------------------------
OpenSSL 1.1.0k release tag
-----BEGIN PGP SIGNATURE-----

iF0EABECAB0WIQTEyrdJw09/TMBP2smnr5549wlFOwUCXO0wpAAKCRCnr5549wlF
O+h7AJ4rXj3F+mOGzShq0EG8pT+omSCo+QCgw+8gwJ8LSfHm8eh5xfeYAE6j75A=
=F/fL
-----END PGP SIGNATURE-----

Andy Polyakov (7):
      rsa/rsa_ossl.c: cache MONT_CTX for public modulus earlier.
      err/err.c: add err_clear_last_constant_time.
      rsa/rsa_ossl.c: make RSAerr call in rsa_ossl_private_decrypt unconditional.
      rsa/rsa_pk1.c: remove memcpy calls from RSA_padding_check_PKCS1_type_2.
      rsa/rsa_oaep.c: remove memcpy calls from RSA_padding_check_PKCS1_OAEP.
      rsa/rsa_ssl.c: make RSA_padding_check_SSLv23 constant-time.
      err/err.c: improve err_clear_last_constant_time's portability.

Bernd Edlinger (6):
      Fix a crash in reuse of d2i_X509_PUBKEY
      Fix memory overrun in rsa padding check functions
      Clear the secret point in ecdh_simple_compute_key
      Clear the point S before freeing in ec_mul_consttime
      Make err_clear_constant_time really constant time
      Modify the RSA_private_decrypt functions to check the padding in     constant time with a memory access pattern that does not depend     on secret information.

Billy Brumley (1):
      SCA hardening for mod. field inversion in EC_GROUP

Corinna Vinschen (1):
      cygwin: drop explicit O_TEXT

Jeff Mahoney (1):
      apps/speed: fix segfault while looking up algorithm name

Kurt Roeckx (1):
      Change default RSA, DSA and DH size to 2048 bit

Matt Caswell (7):
      Prepare for 1.1.0k-dev
      Ensure bn_cmp_words can handle the case where n == 0
      Go into the error state if a fatal alert is sent or received
      Clarify that SSL_shutdown() must not be called after a fatal error
      Prevent over long nonces in ChaCha20-Poly1305
      Test an overlong ChaCha20-Poly1305 nonce
      Avoid an underflow in ecp_nistp521.c

Nicola Tuveri (3):
      [test] unit test for field_inv function pointer in EC_METHOD
      Test for constant-time flag leakage in BN_CTX
      Clear BN_FLG_CONSTTIME on BN_CTX_get()

Richard Levitte (12):
      Change tarball making procedure
      Remove all 'make dist' artifacts
      Document the removed 'dist' target
      Don't export util/mktar.sh
      Don't export the submodules 'boringssl', 'krb5' and 'pyca-cryptography'
      Make sure to run util/mktar.sh from the source directory
      Have util/mktar.sh display the absolute path to the tarball
      Make EVP_PKEY_asn1_add0() stricter about its input
      crypto/engine/eng_cryptodev.c: fix bignum<->crp conversion
      Add CHANGES and NEWS for 1.1.0k
      Update copyright year
      Prepare for 1.1.0k release

Shane Lontis (1):
      fixed public range check in ec_GF2m_simple_oct2point

Tobias Stoeckmann (1):
      Fixed typo (vi leftover).

-----------------------------------------------------------------------


More information about the openssl-commits mailing list