1. 24 12月, 2015 1 次提交
  2. 20 12月, 2015 1 次提交
  3. 17 12月, 2015 1 次提交
    • R
      Rename some BUF_xxx to OPENSSL_xxx · 7644a9ae
      Rich Salz 提交于
      Rename BUF_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
      to OPENSSL_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
      Add #define's for the old names.
      Add CRYPTO_{memdup,strndup}, called by OPENSSL_{memdup,strndup} macros.
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      7644a9ae
  4. 16 12月, 2015 5 次提交
  5. 12 12月, 2015 2 次提交
  6. 10 12月, 2015 1 次提交
  7. 07 12月, 2015 1 次提交
  8. 06 12月, 2015 1 次提交
  9. 05 12月, 2015 3 次提交
  10. 28 11月, 2015 1 次提交
  11. 26 11月, 2015 1 次提交
  12. 25 11月, 2015 1 次提交
  13. 24 11月, 2015 1 次提交
  14. 19 11月, 2015 1 次提交
  15. 14 11月, 2015 2 次提交
  16. 10 11月, 2015 1 次提交
  17. 08 11月, 2015 1 次提交
  18. 30 10月, 2015 5 次提交
  19. 11 10月, 2015 1 次提交
  20. 01 10月, 2015 1 次提交
    • M
      Change the DEFAULT ciphersuites to exclude DES, RC4 and RC2 · c84f7f4a
      Matt Caswell 提交于
      This patch updates the "DEFAULT" cipherstring to be
      "ALL:!COMPLEMENTOFDEFAULT:!eNULL". COMPLEMENTOFDEFAULT is now defined
      internally by a flag on each ciphersuite indicating whether it should be
      excluded from DEFAULT or not. This gives us control at an individual
      ciphersuite level as to exactly what is in DEFAULT and what is not.
      
      Finally all DES, RC4 and RC2 ciphersuites are added to COMPLEMENTOFDEFAULT
      and hence removed from DEFAULT.
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      c84f7f4a
  21. 03 9月, 2015 1 次提交
  22. 14 8月, 2015 1 次提交
  23. 12 8月, 2015 1 次提交
  24. 11 8月, 2015 1 次提交
  25. 03 8月, 2015 1 次提交
    • M
      Move TLS CCS processing into the state machine · 657da85e
      Matt Caswell 提交于
      The handling of incoming CCS records is a little strange. Since CCS is not
      a handshake message it is handled differently to normal handshake messages.
      Unfortunately whilst technically it is not a handhshake message the reality
      is that it must be processed in accordance with the state of the handshake.
      Currently CCS records are processed entirely within the record layer. In
      order to ensure that it is handled in accordance with the handshake state
      a flag is used to indicate that it is an acceptable time to receive a CCS.
      
      Previously this flag did not exist (see CVE-2014-0224), but the flag should
      only really be considered a workaround for the problem that CCS is not
      visible to the state machine.
      
      Outgoing CCS messages are already handled within the state machine.
      
      This patch makes CCS visible to the TLS state machine. A separate commit
      will handle DTLS.
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      657da85e
  26. 30 7月, 2015 3 次提交