1. 26 3月, 2015 3 次提交
  2. 25 3月, 2015 1 次提交
    • M
      Ensure last_write_sequence is saved in DTLS1.2 · d5d0a1cb
      Matt Caswell 提交于
      In DTLS, immediately prior to epoch change, the write_sequence is supposed
      to be stored in s->d1->last_write_sequence. The write_sequence is then reset
      back to 00000000. In the event of retransmits of records from the previous
      epoch, the last_write_sequence is restored. This commit fixes a bug in
      DTLS1.2 where the write_sequence was being reset before last_write_sequence
      was saved, and therefore retransmits are sent with incorrect sequence
      numbers.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      d5d0a1cb
  3. 23 3月, 2015 1 次提交
  4. 17 3月, 2015 1 次提交
    • M
      Add sanity check to PRF · 668f6f08
      Matt Caswell 提交于
      The function tls1_PRF counts the number of digests in use and partitions
      security evenly between them. There always needs to be at least one digest
      in use, otherwise this is an internal error. Add a sanity check for this.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      668f6f08
  5. 11 3月, 2015 1 次提交
  6. 27 2月, 2015 1 次提交
  7. 13 2月, 2015 1 次提交
  8. 06 2月, 2015 1 次提交
  9. 04 2月, 2015 1 次提交
  10. 03 2月, 2015 2 次提交
  11. 29 1月, 2015 1 次提交
  12. 22 1月, 2015 4 次提交
  13. 06 1月, 2015 1 次提交
  14. 17 12月, 2014 2 次提交
  15. 08 12月, 2014 1 次提交
  16. 04 12月, 2014 1 次提交
  17. 15 10月, 2014 1 次提交
  18. 02 7月, 2014 1 次提交
  19. 28 6月, 2014 1 次提交
  20. 31 5月, 2014 1 次提交
  21. 25 5月, 2014 1 次提交
  22. 26 2月, 2014 1 次提交
  23. 04 1月, 2014 1 次提交
  24. 21 12月, 2013 1 次提交
    • D
      Fix DTLS retransmission from previous session. · 20b82b51
      Dr. Stephen Henson 提交于
      For DTLS we might need to retransmit messages from the previous session
      so keep a copy of write context in DTLS retransmission buffers instead
      of replacing it after sending CCS. CVE-2013-6450.
      (cherry picked from commit 34628967f1e65dc8f34e000f0f5518e21afbfc7b)
      20b82b51
  25. 18 12月, 2013 1 次提交
  26. 08 9月, 2013 1 次提交
    • D
      Experimental encrypt-then-mac support. · 5e3ff62c
      Dr. Stephen Henson 提交于
      Experimental support for encrypt then mac from
      draft-gutmann-tls-encrypt-then-mac-02.txt
      
      To enable it set the appropriate extension number (0x10 for the test server)
      using e.g. -DTLSEXT_TYPE_encrypt_then_mac=0x10
      
      For non-compliant peers (i.e. just about everything) this should have no
      effect.
      5e3ff62c
  27. 06 9月, 2013 1 次提交
  28. 28 3月, 2013 1 次提交
  29. 19 3月, 2013 1 次提交
  30. 18 3月, 2013 1 次提交
  31. 08 2月, 2013 1 次提交
  32. 06 2月, 2013 2 次提交
    • A
      ssl/*: remove SSL3_RECORD->orig_len to restore binary compatibility. · 2aec073a
      Andy Polyakov 提交于
      Kludge alert. This is arranged by passing padding length in unused
      bits of SSL3_RECORD->type, so that orig_len can be reconstructed.
      (cherry picked from commit 8bfd4c659f180a6ce34f21c0e62956b362067fba)
      2aec073a
    • D
      Timing fix mitigation for FIPS mode. · c4e6fb15
      Dr. Stephen Henson 提交于
      We have to use EVP in FIPS mode so we can only partially mitigate
      timing differences.
      
      Make an extra call to EVP_DigestSignUpdate to hash additonal blocks
      to cover any timing differences caused by removal of padding.
      (cherry picked from commit b908e88ec15aa0a74805e3f2236fc4f83f2789c2)
      c4e6fb15