- 05 6月, 2014 5 次提交
-
-
由 Dr. Stephen Henson 提交于
A buffer overrun attack can be triggered by sending invalid DTLS fragments to an OpenSSL DTLS client or server. This is potentially exploitable to run arbitrary code on a vulnerable client or server. Fixed by adding consistency check for DTLS fragments. Thanks to Jüri Aedla for reporting this issue. (cherry picked from commit 1632ef744872edc2aa2a53d487d3e79c965a4ad3)
-
由 Dr. Stephen Henson 提交于
Only accept change cipher spec when it is expected instead of at any time. This prevents premature setting of session keys before the master secret is determined which an attacker could use as a MITM attack. Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for reporting this issue and providing the initial fix this patch is based on. (cherry picked from commit bc8923b1ec9c467755cd86f7848c50ee8812e441)
-
由 Dr. Stephen Henson 提交于
Return a fatal error if an attempt is made to use a zero length master secret. (cherry picked from commit 006cd7083f76ed5cb0d9a914857e9231ef1bc317)
-
由 Dr. Stephen Henson 提交于
Unnecessary recursion when receiving a DTLS hello request can be used to crash a DTLS client. Fixed by handling DTLS hello request without recursion. Thanks to Imre Rad (Search-Lab Ltd.) for discovering this issue. (cherry picked from commit d3152655d5319ce883c8e3ac4b99f8de4c59d846)
-
由 Dr. Stephen Henson 提交于
Check session_cert is not NULL before dereferencing it. (cherry picked from commit 8011cd56e39a433b1837465259a9bd24a38727fb)
-
- 03 6月, 2014 2 次提交
-
-
由 David Benjamin 提交于
-
由 zhu qun-ying 提交于
PR#3286
-
- 02 6月, 2014 4 次提交
-
-
由 Sami Farin 提交于
PR#3302
-
由 Matt Caswell 提交于
-
由 David Ramos 提交于
Delays the queue insertion until after the ssl3_setup_buffers() call due to use-after-free bug. PR#3362
-
由 Dr. Stephen Henson 提交于
Add TLS padding extension to SSL_OP_ALL so it is used with other "bugs" options and can be turned off. This replaces SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG which is an ancient option referring to SSLv2 and SSLREF. PR#3336
-
- 01 6月, 2014 1 次提交
-
-
由 David Ramos 提交于
Make sure there is an extra 4 bytes for server done message when NETSCAPE_HANG_BUG is defined. PR#3361
-
- 31 5月, 2014 2 次提交
-
-
由 Dr. Stephen Henson 提交于
PR#3319
-
由 Dr. Stephen Henson 提交于
-
- 26 5月, 2014 1 次提交
-
-
由 Juli Mallett 提交于
Closes #74.
-
- 25 5月, 2014 1 次提交
-
-
由 Matt Caswell 提交于
-
- 24 5月, 2014 1 次提交
-
-
由 Martin Kaiser 提交于
Add an NSS output format to sess_id to export to export the session id and the master key in NSS keylog format. PR#3352
-
- 23 5月, 2014 1 次提交
-
-
由 Mike Bland 提交于
Replaces the entire test with a trivial implementation when OPENSSL_NO_HEARTBEATS is defined.
-
- 20 5月, 2014 8 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Ben Laurie 提交于
-
由 Mike Bland 提交于
The previous calls to memset() were added to tear_down() when I noticed the test spuriously failing in opt mode, with different results each time. This appeared to be because the allocator zeros out memory in debug mode, but not in opt mode. Since the heartbeat functions silently drop the request on error without modifying the contents of the write buffer, whatever random contents were in memory before being reallocated to the write buffer used in the test would cause nondeterministic test failures in the Heartbleed regression cases. Adding these calls allowed the test to pass in both debug and opt modes. Ben Laurie notified me offline that the test was aborting in debug-ben-debug-64-clang mode, configured with GitConfigure and built with GitMake. Looking into this, I realized the first memset() call was zeroing out a reference count used by SSL_free() that was checked in debug-ben-debug-64-clang mode but not in the normal debug mode. Removing the memset() calls from tear_down() and adding a memset() for the write buffer in set_up() addresses the issue and allows the test to successfully execute in debug, opt, and debug-ben-debug-64-clang modes.
-
由 Mike Bland 提交于
Checks the return values of ssl_init_wbio_buffer() and ssl3_setup_buffers().
-
由 Ben Laurie 提交于
-
由 Mike Bland 提交于
Regression test against CVE-2014-0160 (Heartbleed). More info: http://mike-bland.com/tags/heartbleed.html
-
- 13 5月, 2014 2 次提交
-
-
由 Kurt Roeckx 提交于
-
由 Serguei E. Leontiev 提交于
Replace manual ASN.1 decoder with ASN1_get object. This will decode the tag and length properly and check against it does not exceed the supplied buffer length. PR#3335
-
- 12 5月, 2014 2 次提交
-
-
由 Matt Caswell 提交于
-
由 Günther Noack 提交于
PR: 3317
-
- 11 5月, 2014 2 次提交
-
-
由 Matt Caswell 提交于
-
由 Tim Hudson 提交于
-
- 08 5月, 2014 1 次提交
-
-
由 Tim Hudson 提交于
-
- 01 5月, 2014 1 次提交
-
-
由 Matt Caswell 提交于
-
- 26 4月, 2014 1 次提交
-
-
由 Geoff Thorpe 提交于
-
- 23 4月, 2014 1 次提交
-
-
由 Ben Laurie 提交于
-
- 21 4月, 2014 1 次提交
-
-
由 Kaspar Brand 提交于
Fix typo that stopped SSL_CTX_get_{first,next}_certificate from working.
-
- 08 4月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
A missing bounds check in the handling of the TLS heartbeat extension can be used to reveal up to 64k of memory to a connected client or server. Thanks for Neel Mehta of Google Security for discovering this bug and to Adam Langley <agl@chromium.org> and Bodo Moeller <bmoeller@acm.org> for preparing the fix (CVE-2014-0160) (cherry picked from commit 96db9023b881d7cd9f379b0c154650d6c108e9a3)
-
- 06 4月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Enable TLS padding extension using official value from: http://www.iana.org/assignments/tls-extensiontype-values/tls-extensiontype-values.xhtml
-
- 05 4月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-