- 15 6月, 2014 2 次提交
-
-
由 Dr. Stephen Henson 提交于
Allow CCS after finished has been sent by client: at this point keys have been correctly set up so it is OK to accept CCS from server. Without this renegotiation can sometimes fail. PR#3400
-
由 Andy Polyakov 提交于
-
- 14 6月, 2014 2 次提交
-
-
由 Andy Polyakov 提交于
PR: 3405
-
由 Andy Polyakov 提交于
PR: 3405
-
- 13 6月, 2014 6 次提交
-
-
由 Matt Caswell 提交于
Based on an original patch by Joel Sing (OpenBSD) who also originally identified the issue.
-
由 Matt Caswell 提交于
This reverts commit 2f1dffa8. Missing attribution.
-
由 Viktor Dukhovni 提交于
A client reference identity of ".example.com" matches a server certificate presented identity that is any sub-domain of "example.com" (e.g. "www.sub.example.com). With the X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS flag, it matches only direct child sub-domains (e.g. "www.sub.example.com").
-
由 Kurt Cancemi 提交于
In the ssl_cipher_get_evp() function, fix off-by-one errors in index validation before accessing arrays. PR#3375
-
由 Andy Polyakov 提交于
Fix SEH and stack handling in Win64 build.
-
由 Matt Caswell 提交于
-
- 12 6月, 2014 2 次提交
-
-
由 Dr. Stephen Henson 提交于
(cherry picked from commit 5f4c5a902b0508eab235adecb34b236cdc0048a5)
-
由 Andy Polyakov 提交于
-
- 11 6月, 2014 8 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
由 Rob Stradling 提交于
-
由 Matt Caswell 提交于
-
由 Andy Polyakov 提交于
-
由 Hubert Kario 提交于
* Make a clear distinction between DH and ECDH key exchange. * Group all key exchange cipher suite identifiers, first DH then ECDH * add descriptions for all supported *DH* identifiers * add ECDSA authentication descriptions * add example showing how to disable all suites that offer no authentication or encryption
-
由 Mike Bland 提交于
Defines SETUP_TEST_FIXTURE and EXECUTE_TEST, and updates ssl/heartbeat_test.c using these macros. SETUP_TEST_FIXTURE makes use of the new TEST_CASE_NAME macro, defined to use __func__ or __FUNCTION__ on platforms that support those symbols, or to use the file name and line number otherwise. This should fix several reported build problems related to lack of C99 support.
-
- 10 6月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
PR#3394
-
- 09 6月, 2014 4 次提交
-
-
由 Dr. Stephen Henson 提交于
SRP ciphersuites do not have no authentication. They have authentication based on SRP. Add new SRP authentication flag and cipher string.
-
由 Dr. Stephen Henson 提交于
Fix strength_bits to 112 for 3DES.
-
由 Kurt Roeckx 提交于
It's using an internal API that that might not be available in the shared library.
-
由 Jakub Wilk 提交于
Because of a missing include <fcntl.h> we don't have O_CREATE and don't create the file with open() using mode 0600 but fall back to using fopen() with the default umask followed by a chmod(). Problem found by Jakub Wilk <jwilk@debian.org>.
-
- 07 6月, 2014 7 次提交
-
-
由 Dr. Stephen Henson 提交于
If application uses tls_session_secret_cb for session resumption set the CCS_OK flag.
-
由 Dr. Stephen Henson 提交于
Encrypt then MAC now has an official extension value, see: http://www.ietf.org/id/draft-ietf-tls-encrypt-then-mac-02.txt
-
由 Matt Caswell 提交于
-
由 Andy Polyakov 提交于
Pointer out and suggested by: Ard Biesheuvel.
-
由 Andy Polyakov 提交于
Submitted by: Ard Biesheuvel.
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
Result of joint effort with Ard Biesheuvel.
-
- 06 6月, 2014 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Andy Polyakov 提交于
- fix 32-bit build (submitted by Ard Biesheuvel); - fix performance issue in CTR;
-
- 05 6月, 2014 6 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
A buffer overrun attack can be triggered by sending invalid DTLS fragments to an OpenSSL DTLS client or server. This is potentially exploitable to run arbitrary code on a vulnerable client or server. Fixed by adding consistency check for DTLS fragments. Thanks to Jüri Aedla for reporting this issue. (cherry picked from commit 1632ef744872edc2aa2a53d487d3e79c965a4ad3)
-
由 Dr. Stephen Henson 提交于
Only accept change cipher spec when it is expected instead of at any time. This prevents premature setting of session keys before the master secret is determined which an attacker could use as a MITM attack. Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for reporting this issue and providing the initial fix this patch is based on. (cherry picked from commit bc8923b1ec9c467755cd86f7848c50ee8812e441)
-
由 Dr. Stephen Henson 提交于
Return a fatal error if an attempt is made to use a zero length master secret. (cherry picked from commit 006cd7083f76ed5cb0d9a914857e9231ef1bc317)
-
由 Dr. Stephen Henson 提交于
Unnecessary recursion when receiving a DTLS hello request can be used to crash a DTLS client. Fixed by handling DTLS hello request without recursion. Thanks to Imre Rad (Search-Lab Ltd.) for discovering this issue. (cherry picked from commit d3152655d5319ce883c8e3ac4b99f8de4c59d846)
-
由 Dr. Stephen Henson 提交于
Check session_cert is not NULL before dereferencing it. (cherry picked from commit 8011cd56e39a433b1837465259a9bd24a38727fb)
-