Go to file
Maximilian Blenk 0324ffc5d5 Fix PEM certificate loading that sometimes fails
As described in https://github.com/openssl/openssl/issues/9187, the
loading of PEM certificates sometimes fails if a line of base64
content has the length of a multiple of 254.
The problem is in get_header_and_data(). When such a line with a
length of 254 (or a multiple) has been read, the next read will
only read a newline. Due to this get_header_and_data() expects to be
in the header not in the data area. This commit fixes that by checking
if lines have been read completely or only partially. In case of a
previous partial read, a newline will be ignored.

Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
Reviewed-by: Ben Kaduk <kaduk@mit.edu>
(Merged from https://github.com/openssl/openssl/pull/11741)
2020-05-08 13:27:47 -07:00
.github CIFuzz turning dry_run off 2020-05-04 08:51:56 +01:00
apps SSL_OP_DISABLE_TLSEXT_CA_NAMES option implementation 2020-05-07 16:14:47 +03:00
boringssl@2070f8ad91
Configurations Configurations: Identify the shell variables around MANSUFFIX 2020-04-28 12:09:11 +02:00
crypto Fix PEM certificate loading that sometimes fails 2020-05-08 13:27:47 -07:00
demos
dev travis: enable markdownlint checks 2020-05-08 16:22:01 +02:00
doc SSL_OP_DISABLE_TLSEXT_CA_NAMES option implementation 2020-05-07 16:14:47 +03:00
engines In OpenSSL builds, declare STACK for datatypes ... 2020-04-24 16:42:46 +02:00
external/perl
fuzz Fix issues reported by markdownlint 2020-05-08 16:22:02 +02:00
include SSL_OP_DISABLE_TLSEXT_CA_NAMES option implementation 2020-05-07 16:14:47 +03:00
krb5@890ca2f401
ms
os-dep
providers Add RSA SHA512 truncated digest support 2020-05-07 16:00:40 +10:00
pyca-cryptography@09403100de
ssl Fix use-after-free in BIO_C_SET_SSL callback 2020-05-07 19:18:09 +02:00
test Fix PEM certificate loading that sometimes fails 2020-05-08 13:27:47 -07:00
tools
util travis: enable markdownlint checks 2020-05-08 16:22:01 +02:00
VMS
.gitattributes
.gitignore Update some nits around the FIPS module 2020-04-24 13:19:16 +02:00
.gitmodules
.travis-apt-pin.preferences
.travis-create-release.sh
.travis.yml travis: enable markdownlint checks 2020-05-08 16:22:01 +02:00
ACKNOWLEDGEMENTS.md Fix issues reported by markdownlint 2020-05-08 16:22:02 +02:00
appveyor.yml
AUTHORS.md Fix issues reported by markdownlint 2020-05-08 16:22:02 +02:00
build.info
CHANGES.md Fix issues reported by markdownlint 2020-05-08 16:22:02 +02:00
config
config.com
configdata.pm.in
Configure Configure: avoid perl regexp bugs 2020-05-06 20:16:25 +02:00
CONTRIBUTING.md Fix issues reported by markdownlint 2020-05-08 16:22:02 +02:00
e_os.h
FAQ.md
HACKING
INSTALL.md Fix issues reported by markdownlint 2020-05-08 16:22:02 +02:00
LICENSE
NEWS.md Fix issues reported by markdownlint 2020-05-08 16:22:02 +02:00
NOTES.ANDROID
NOTES.DJGPP
NOTES.PERL
NOTES.UNIX
NOTES.VALGRIND
NOTES.VMS
NOTES.WIN
README.ENGINE
README.FIPS
README.md Fix issues reported by markdownlint 2020-05-08 16:22:02 +02:00
SUPPORT.md Fix issues reported by markdownlint 2020-05-08 16:22:02 +02:00
VERSION Prepare for 3.0 alpha 2 2020-04-23 14:10:38 +01:00

Welcome to the OpenSSL Project

openssl logo

travis badge appveyor badge

OpenSSL is a robust, commercial-grade, full-featured Open Source Toolkit for the Transport Layer Security (TLS) protocol formerly known as the Secure Sockets Layer (SSL) protocol. The protocol implementation is based on a full-strength general purpose cryptographic library, which can also be used stand-alone.

OpenSSL is descended from the SSLeay library developed by Eric A. Young and Tim J. Hudson.

The official Home Page of the OpenSSL Project is www.openssl.org.

Table of Contents

Overview

The OpenSSL toolkit includes:

  • libssl an implementation of all TLS protocol versions up to TLSv1.3 (RFC 8446).

  • libcrypto a full-strength general purpose cryptographic library. It constitutes the basis of the TLS implementation, but can also be used independently.

  • openssl the OpenSSL command line tool, a swiss army knife for cryptographic tasks, testing and analyzing. It can be used for

    • creation of key parameters
    • creation of X.509 certificates, CSRs and CRLs
    • calculation of message digests
    • encryption and decryption
    • SSL/TLS client and server tests
    • handling of S/MIME signed or encrypted mail
    • and more...

Download

For Production Use

Source code tarballs of the official releases can be downloaded from www.openssl.org/source. The OpenSSL project does not distribute the toolkit in binary form.

However, for a large variety of operating systems precompiled versions of the OpenSSL toolkit are available. In particular on Linux and other Unix operating systems it is normally recommended to link against the precompiled shared libraries provided by the distributor or vendor.

For Testing and Development

Although testing and development could in theory also be done using the source tarballs, having a local copy of the git repository with the entire project history gives you much more insight into the code base.

The official OpenSSL Git Repository is located at git.openssl.org. There is a GitHub mirror of the repository at github.com/openssl/openssl, which is updated automatically from the former on every commit.

A local copy of the Git Repository can be obtained by cloning it from the original OpenSSL repository using

git clone git://git.openssl.org/openssl.git

or from the GitHub mirror using

git clone https://github.com/openssl/openssl.git

If you intend to contribute to OpenSSL, either to fix bugs or contribute new features, you need to fork the OpenSSL repository openssl/openssl on GitHub and clone your public fork instead.

git clone https://github.com/yourname/openssl.git

This is necessary, because all development of OpenSSL nowadays is done via GitHub pull requests. For more details, see Contributing.

Build and Install

After obtaining the Source, have a look at the INSTALL file for detailed instructions about building and installing OpenSSL. For some platforms, the installation instructions are amended by a platform specific document.

Specific notes on upgrading to OpenSSL 3.0 from previous versions, as well as known issues are available on the OpenSSL wiki.

Documentation

Manual Pages

The manual pages for the master branch and all current stable releases are available online.

Wiki

There is a Wiki at wiki.openssl.org which is currently not very active. It contains a lot of useful information, not all of which is up to date.

License

OpenSSL is licensed under the Apache License 2.0, which means that you are free to get and use it for commercial and non-commercial purposes as long as you fulfill its conditions.

See the LICENSE file for more details.

Support

There are various ways to get in touch. The correct channel depends on your requirement. see the SUPPORT file for more details.

Contributing

If you are interested and willing to contribute to the OpenSSL project, please take a look at the CONTRIBUTING file.

Since 2016, development takes place in public on the GitHub open source platform. The OpenSSL Project Pages at openssl.github.io are a valuable source of information if you want to get familiar with our development process on GitHub.

Legalities

A number of nations restrict the use or export of cryptography. If you are potentially subject to such restrictions you should seek legal advice before attempting to develop or distribute cryptographic code.

Copyright

Copyright (c) 1998-2020 The OpenSSL Project

Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson

All rights reserved.