Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
ef28891b
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
大约 1 年 前同步成功
通知
9
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
体验新版 GitCode,发现更多精彩内容 >>
提交
ef28891b
编写于
8月 18, 2016
作者:
R
Rich Salz
提交者:
Matt Caswell
8月 24, 2016
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
Put DES into "not default" category.
Add CVE to CHANGES Reviewed-by:
N
Emilia Käsper
<
emilia@openssl.org
>
上级
d33726b9
变更
2
隐藏空白更改
内联
并排
Showing
2 changed file
with
14 addition
and
13 deletion
+14
-13
CHANGES
CHANGES
+3
-2
ssl/s3_lib.c
ssl/s3_lib.c
+11
-11
未找到文件。
CHANGES
浏览文件 @
ef28891b
...
...
@@ -4,8 +4,9 @@
Changes between 1.0.2h and 1.1.0 [xx XXX xxxx]
*) Because of the SWEET32 attack, 3DES cipher suites have been disabled by
default like RC4. See the RC4 item below to re-enable both.
*) To mitigate the SWEET32 attack (CVE-2016-2183), 3DES cipher suites
have been disabled by default and removed from DEFAULT, just like RC4.
See the RC4 item below to re-enable both.
[Rich Salz]
*) The method for finding the storage location for the Windows RAND seed file
...
...
ssl/s3_lib.c
浏览文件 @
ef28891b
...
...
@@ -57,7 +57,7 @@
#define SSL3_NUM_CIPHERS OSSL_NELEM(ssl3_ciphers)
/*
* The list of available ciphers, organized into the following
* The list of available ciphers,
mostly
organized into the following
* groups:
* Always there
* EC
...
...
@@ -108,7 +108,7 @@ static SSL_CIPHER ssl3_ciphers[] = {
SSL_SHA1
,
SSL3_VERSION
,
TLS1_2_VERSION
,
DTLS1_BAD_VER
,
DTLS1_2_VERSION
,
SSL_MEDIUM
|
SSL_FIPS
,
SSL_
NOT_DEFAULT
|
SSL_
MEDIUM
|
SSL_FIPS
,
SSL_HANDSHAKE_MAC_DEFAULT
|
TLS1_PRF
,
112
,
168
,
...
...
@@ -138,7 +138,7 @@ static SSL_CIPHER ssl3_ciphers[] = {
SSL_SHA1
,
SSL3_VERSION
,
TLS1_2_VERSION
,
DTLS1_BAD_VER
,
DTLS1_2_VERSION
,
SSL_MEDIUM
|
SSL_FIPS
,
SSL_
NOT_DEFAULT
|
SSL_
MEDIUM
|
SSL_FIPS
,
SSL_HANDSHAKE_MAC_DEFAULT
|
TLS1_PRF
,
112
,
168
,
...
...
@@ -862,7 +862,7 @@ static SSL_CIPHER ssl3_ciphers[] = {
SSL_SHA1
,
SSL3_VERSION
,
TLS1_2_VERSION
,
DTLS1_BAD_VER
,
DTLS1_2_VERSION
,
SSL_MEDIUM
|
SSL_FIPS
,
SSL_
NOT_DEFAULT
|
SSL_
MEDIUM
|
SSL_FIPS
,
SSL_HANDSHAKE_MAC_DEFAULT
|
TLS1_PRF
,
112
,
168
,
...
...
@@ -924,7 +924,7 @@ static SSL_CIPHER ssl3_ciphers[] = {
SSL_SHA1
,
SSL3_VERSION
,
TLS1_2_VERSION
,
DTLS1_BAD_VER
,
DTLS1_2_VERSION
,
SSL_MEDIUM
|
SSL_FIPS
,
SSL_
NOT_DEFAULT
|
SSL_
MEDIUM
|
SSL_FIPS
,
SSL_HANDSHAKE_MAC_DEFAULT
|
TLS1_PRF
,
112
,
168
,
...
...
@@ -1201,7 +1201,7 @@ static SSL_CIPHER ssl3_ciphers[] = {
SSL_SHA1
,
SSL3_VERSION
,
TLS1_2_VERSION
,
DTLS1_BAD_VER
,
DTLS1_2_VERSION
,
SSL_MEDIUM
|
SSL_FIPS
,
SSL_
NOT_DEFAULT
|
SSL_
MEDIUM
|
SSL_FIPS
,
SSL_HANDSHAKE_MAC_DEFAULT
|
TLS1_PRF
,
112
,
168
,
...
...
@@ -1248,7 +1248,7 @@ static SSL_CIPHER ssl3_ciphers[] = {
SSL_SHA1
,
SSL3_VERSION
,
TLS1_2_VERSION
,
DTLS1_BAD_VER
,
DTLS1_2_VERSION
,
SSL_MEDIUM
|
SSL_FIPS
,
SSL_
NOT_DEFAULT
|
SSL_
MEDIUM
|
SSL_FIPS
,
SSL_HANDSHAKE_MAC_DEFAULT
|
TLS1_PRF
,
112
,
168
,
...
...
@@ -1295,7 +1295,7 @@ static SSL_CIPHER ssl3_ciphers[] = {
SSL_SHA1
,
SSL3_VERSION
,
TLS1_2_VERSION
,
DTLS1_BAD_VER
,
DTLS1_2_VERSION
,
SSL_MEDIUM
|
SSL_FIPS
,
SSL_
NOT_DEFAULT
|
SSL_
MEDIUM
|
SSL_FIPS
,
SSL_HANDSHAKE_MAC_DEFAULT
|
TLS1_PRF
,
112
,
168
,
...
...
@@ -1613,7 +1613,7 @@ static SSL_CIPHER ssl3_ciphers[] = {
SSL_SHA1
,
SSL3_VERSION
,
TLS1_2_VERSION
,
DTLS1_BAD_VER
,
DTLS1_2_VERSION
,
SSL_MEDIUM
|
SSL_FIPS
,
SSL_
NOT_DEFAULT
|
SSL_
MEDIUM
|
SSL_FIPS
,
SSL_HANDSHAKE_MAC_DEFAULT
|
TLS1_PRF
,
112
,
168
,
...
...
@@ -1739,7 +1739,7 @@ static SSL_CIPHER ssl3_ciphers[] = {
SSL_SHA1
,
SSL3_VERSION
,
TLS1_2_VERSION
,
DTLS1_BAD_VER
,
DTLS1_2_VERSION
,
SSL_MEDIUM
,
SSL_
NOT_DEFAULT
|
SSL_
MEDIUM
,
SSL_HANDSHAKE_MAC_DEFAULT
|
TLS1_PRF
,
112
,
168
,
...
...
@@ -1754,7 +1754,7 @@ static SSL_CIPHER ssl3_ciphers[] = {
SSL_SHA1
,
SSL3_VERSION
,
TLS1_2_VERSION
,
DTLS1_BAD_VER
,
DTLS1_2_VERSION
,
SSL_MEDIUM
,
SSL_
NOT_DEFAULT
|
SSL_
MEDIUM
,
SSL_HANDSHAKE_MAC_DEFAULT
|
TLS1_PRF
,
112
,
168
,
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录