1. 23 6月, 2014 1 次提交
  2. 18 6月, 2014 1 次提交
  3. 15 6月, 2014 1 次提交
    • D
      Accept CCS after sending finished. · 3b77f017
      Dr. Stephen Henson 提交于
      Allow CCS after finished has been sent by client: at this point
      keys have been correctly set up so it is OK to accept CCS from
      server. Without this renegotiation can sometimes fail.
      
      PR#3400
      3b77f017
  4. 13 6月, 2014 4 次提交
  5. 12 6月, 2014 1 次提交
  6. 11 6月, 2014 2 次提交
  7. 10 6月, 2014 1 次提交
  8. 09 6月, 2014 2 次提交
  9. 07 6月, 2014 2 次提交
  10. 05 6月, 2014 6 次提交
    • D
      Update value to use a free bit. · 5111672b
      Dr. Stephen Henson 提交于
      5111672b
    • D
      Fix for CVE-2014-0195 · 410e444b
      Dr. Stephen Henson 提交于
      A buffer overrun attack can be triggered by sending invalid DTLS fragments
      to an OpenSSL DTLS client or server. This is potentially exploitable to
      run arbitrary code on a vulnerable client or server.
      
      Fixed by adding consistency check for DTLS fragments.
      
      Thanks to Jüri Aedla for reporting this issue.
      (cherry picked from commit 1632ef744872edc2aa2a53d487d3e79c965a4ad3)
      410e444b
    • D
      Fix for CVE-2014-0224 · a91be108
      Dr. Stephen Henson 提交于
      Only accept change cipher spec when it is expected instead of at any
      time. This prevents premature setting of session keys before the master
      secret is determined which an attacker could use as a MITM attack.
      
      Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for reporting this issue
      and providing the initial fix this patch is based on.
      (cherry picked from commit bc8923b1ec9c467755cd86f7848c50ee8812e441)
      a91be108
    • D
      Additional CVE-2014-0224 protection. · a7c682fb
      Dr. Stephen Henson 提交于
      Return a fatal error if an attempt is made to use a zero length
      master secret.
      (cherry picked from commit 006cd7083f76ed5cb0d9a914857e9231ef1bc317)
      a7c682fb
    • D
      Fix CVE-2014-0221 · b4322e1d
      Dr. Stephen Henson 提交于
      Unnecessary recursion when receiving a DTLS hello request can be used to
      crash a DTLS client. Fixed by handling DTLS hello request without recursion.
      
      Thanks to Imre Rad (Search-Lab Ltd.) for discovering this issue.
      (cherry picked from commit d3152655d5319ce883c8e3ac4b99f8de4c59d846)
      b4322e1d
    • D
      Fix CVE-2014-3470 · a5362db4
      Dr. Stephen Henson 提交于
      Check session_cert is not NULL before dereferencing it.
      (cherry picked from commit 8011cd56e39a433b1837465259a9bd24a38727fb)
      a5362db4
  11. 03 6月, 2014 2 次提交
  12. 02 6月, 2014 4 次提交
  13. 01 6月, 2014 1 次提交
  14. 31 5月, 2014 2 次提交
  15. 26 5月, 2014 1 次提交
  16. 25 5月, 2014 1 次提交
  17. 24 5月, 2014 1 次提交
  18. 23 5月, 2014 1 次提交
  19. 20 5月, 2014 6 次提交
    • D
      dcca7b13
    • D
      Adding padding extension to trace code. · 6db14dbc
      Dr. Stephen Henson 提交于
      6db14dbc
    • D
      Fix bug in signature algorithm copy. · deffd89a
      Dr. Stephen Henson 提交于
      deffd89a
    • B
      Fixup for ancient compilers. · 2ec52dc3
      Ben Laurie 提交于
      2ec52dc3
    • M
      Zero-initialize heartbeat test write buffer · 39dd6f45
      Mike Bland 提交于
      The previous calls to memset() were added to tear_down() when I noticed the
      test spuriously failing in opt mode, with different results each time. This
      appeared to be because the allocator zeros out memory in debug mode, but not
      in opt mode. Since the heartbeat functions silently drop the request on error
      without modifying the contents of the write buffer, whatever random contents
      were in memory before being reallocated to the write buffer used in the test
      would cause nondeterministic test failures in the Heartbleed regression cases.
      Adding these calls allowed the test to pass in both debug and opt modes.
      
      Ben Laurie notified me offline that the test was aborting in
      debug-ben-debug-64-clang mode, configured with GitConfigure and built with
      GitMake. Looking into this, I realized the first memset() call was zeroing out
      a reference count used by SSL_free() that was checked in
      debug-ben-debug-64-clang mode but not in the normal debug mode.
      
      Removing the memset() calls from tear_down() and adding a memset() for the
      write buffer in set_up() addresses the issue and allows the test to
      successfully execute in debug, opt, and debug-ben-debug-64-clang modes.
      39dd6f45
    • M
      More through error checks in set_up · f5ad068b
      Mike Bland 提交于
      Checks the return values of ssl_init_wbio_buffer() and ssl3_setup_buffers().
      f5ad068b