1. 09 1月, 2014 8 次提交
  2. 07 1月, 2014 1 次提交
  3. 04 1月, 2014 3 次提交
  4. 02 1月, 2014 1 次提交
  5. 30 12月, 2013 1 次提交
  6. 21 12月, 2013 1 次提交
    • D
      Fix DTLS retransmission from previous session. · 20b82b51
      Dr. Stephen Henson 提交于
      For DTLS we might need to retransmit messages from the previous session
      so keep a copy of write context in DTLS retransmission buffers instead
      of replacing it after sending CCS. CVE-2013-6450.
      (cherry picked from commit 34628967f1e65dc8f34e000f0f5518e21afbfc7b)
      20b82b51
  7. 18 12月, 2013 1 次提交
  8. 13 12月, 2013 2 次提交
  9. 19 11月, 2013 2 次提交
  10. 18 11月, 2013 1 次提交
  11. 14 11月, 2013 4 次提交
    • P
      Fix compilation with no-nextprotoneg. · 2911575c
      Piotr Sikora 提交于
      PR#3106
      2911575c
    • D
      Allow match selecting of current certificate. · 629b640b
      Dr. Stephen Henson 提交于
      If pointer comparison for current certificate fails check
      to see if a match using X509_cmp succeeds for the current
      certificate: this is useful for cases where the certificate
      pointer is not available.
      629b640b
    • R
      Additional "chain_cert" functions. · 7b6b246f
      Rob Stradling 提交于
      PR#3169
      
      This patch, which currently applies successfully against master and
      1_0_2, adds the following functions:
      
      SSL_[CTX_]select_current_cert() - set the current certificate without
      disturbing the existing structure.
      
      SSL_[CTX_]get0_chain_certs() - get the current certificate's chain.
      
      SSL_[CTX_]clear_chain_certs() - clear the current certificate's chain.
      
      The patch also adds these functions to, and fixes some existing errors
      in, SSL_CTX_add1_chain_cert.pod.
      7b6b246f
    • K
      Delete duplicate entry. · 44314cf6
      Krzysztof Kwiatkowski 提交于
      PR#3172
      44314cf6
  12. 07 11月, 2013 1 次提交
    • D
      Experimental workaround TLS filler (WTF) extension. · 0467ea68
      Dr. Stephen Henson 提交于
      Based on a suggested workaround for the "TLS hang bug" (see FAQ and PR#2771):
      if the TLS Client Hello record length value would otherwise be > 255 and less
      that 512 pad with a dummy extension containing zeroes so it is at least 512.
      
      To enable it use an unused extension number (for example 0x4242) using
      e.g. -DTLSEXT_TYPE_wtf=0x4242
      
      WARNING: EXPERIMENTAL, SUBJECT TO CHANGE.
      0467ea68
  13. 06 11月, 2013 2 次提交
  14. 02 11月, 2013 5 次提交
    • D
      Add brainpool curves to trace output. · d519f083
      Dr. Stephen Henson 提交于
      (cherry picked from commit bd80d0229c9a154f569b046365bc85d76b59cfc5)
      d519f083
    • R
      DTLS/SCTP Finished Auth Bug · b9ef52b0
      Robin Seggelmann 提交于
      PR: 2808
      
      With DTLS/SCTP the SCTP extension SCTP-AUTH is used to protect DATA and
      FORWARD-TSN chunks. The key for this extension is derived from the
      master secret and changed with the next ChangeCipherSpec, whenever a new
      key has been negotiated. The following Finished then already uses the
      new key.  Unfortunately, the ChangeCipherSpec and Finished are part of
      the same flight as the ClientKeyExchange, which is necessary for the
      computation of the new secret. Hence, these messages are sent
      immediately following each other, leaving the server very little time to
      compute the new secret and pass it to SCTP before the finished arrives.
      So the Finished is likely to be discarded by SCTP and a retransmission
      becomes necessary. To prevent this issue, the Finished of the client is
      still sent with the old key.
      (cherry picked from commit 9fb523adce6fd6015b68da2ca8e4ac4900ac2be2)
      b9ef52b0
    • P
      Fix SSL_OP_SINGLE_ECDH_USE · 29b490a4
      Piotr Sikora 提交于
      Don't require a public key in tls1_set_ec_id if compression status is
      not needed. This fixes a bug where SSL_OP_SINGLE_ECDH_USE wouldn't work.
      (cherry picked from commit 5ff68e8f6dac3b0d8997b8bc379f9111c2bab74f)
      29b490a4
    • D
      Add -ecdh_single option. · a9bc1af9
      Dr. Stephen Henson 提交于
      Add -ecdh_single option to set SSL_OP_SINGLE_ECDH_USE on the command line.
      (cherry picked from commit f14a4a861d2d221ed565a75441a218f85b8db530)
      a9bc1af9
    • D
      Fix warning. · 96e16bdd
      Dr. Stephen Henson 提交于
      96e16bdd
  15. 22 10月, 2013 2 次提交
  16. 21 10月, 2013 5 次提交
    • D
      Constification. · 27f3b65f
      Dr. Stephen Henson 提交于
      27f3b65f
    • B
      Remove unused variable. · 9f944107
      Ben Laurie 提交于
      9f944107
    • N
      Fix another gmt_unix_time case in server_random · 2927791d
      Nick Mathewson 提交于
      2927791d
    • N
      Do not include a timestamp in the Client/ServerHello Random field. · 2016265d
      Nick Mathewson 提交于
      Instead, send random bytes, unless SSL_SEND_{CLIENT,SERVER}RANDOM_MODE
      is set.
      
      This is a forward-port of commits:
        4af793036f6ef4f0a1078e5d7155426a98d50e37
        f4c93b46edb51da71f09eda99e83eaf193a33c08
        3da721dac9382c48812c8eba455528fd59af2eef
        2583270191a8b27eed303c03ece1da97b9b69fd3
      
      While the gmt_unix_time record was added in an ostensible attempt to
      mitigate the dangers of a bad RNG, its presence leaks the host's view
      of the current time in the clear.  This minor leak can help
      fingerprint TLS instances across networks and protocols... and what's
      worse, it's doubtful thet the gmt_unix_time record does any good at
      all for its intended purpose, since:
      
          * It's quite possible to open two TLS connections in one second.
      
          * If the PRNG output is prone to repeat itself, ephemeral
            handshakes (and who knows what else besides) are broken.
      2016265d
    • D
      Extend SSL_CONF · ec2f7e56
      Dr. Stephen Henson 提交于
      Extend SSL_CONF to return command value types.
      
      Add certificate and key options.
      
      Update documentation.
      ec2f7e56