1. 21 11月, 2014 1 次提交
  2. 20 11月, 2014 4 次提交
  3. 29 10月, 2014 1 次提交
    • E
      Tighten session ticket handling · d663df23
      Emilia Kasper 提交于
      Tighten client-side session ticket handling during renegotiation:
      ensure that the client only accepts a session ticket if the server sends
      the extension anew in the ServerHello. Previously, a TLS client would
      reuse the old extension state and thus accept a session ticket if one was
      announced in the initial ServerHello.
      Reviewed-by: NBodo Moeller <bodo@openssl.org>
      d663df23
  4. 28 10月, 2014 2 次提交
  5. 22 10月, 2014 1 次提交
  6. 15 10月, 2014 2 次提交
  7. 02 10月, 2014 1 次提交
  8. 29 9月, 2014 2 次提交
  9. 24 9月, 2014 1 次提交
  10. 23 9月, 2014 1 次提交
  11. 05 9月, 2014 1 次提交
  12. 15 8月, 2014 1 次提交
  13. 02 8月, 2014 2 次提交
  14. 01 8月, 2014 1 次提交
  15. 23 7月, 2014 1 次提交
  16. 04 7月, 2014 1 次提交
  17. 01 6月, 2014 1 次提交
  18. 24 5月, 2014 1 次提交
  19. 26 4月, 2014 2 次提交
    • M
      Fix version documentation. · 8acb9538
      mancha 提交于
      Specify -f is for compilation flags. Add -d to synopsis section.
      
      Closes #77.
      8acb9538
    • M
      Fix eckey_priv_encode() · e14f14d3
      mancha 提交于
      Fix eckey_priv_encode to return an error on failure of i2d_ECPrivateKey.
      e14f14d3
  20. 22 4月, 2014 1 次提交
  21. 08 4月, 2014 1 次提交
    • D
      Add heartbeat extension bounds check. · 731f4314
      Dr. Stephen Henson 提交于
      A missing bounds check in the handling of the TLS heartbeat extension
      can be used to reveal up to 64k of memory to a connected client or
      server.
      
      Thanks for Neel Mehta of Google Security for discovering this bug and to
      Adam Langley <agl@chromium.org> and Bodo Moeller <bmoeller@acm.org> for
      preparing the fix (CVE-2014-0160)
      (cherry picked from commit 96db9023b881d7cd9f379b0c154650d6c108e9a3)
      731f4314
  22. 06 4月, 2014 1 次提交
  23. 01 4月, 2014 1 次提交
  24. 12 3月, 2014 1 次提交
    • D
      Fix for CVE-2014-0076 · f9b6c0ba
      Dr. Stephen Henson 提交于
      Fix for the attack described in the paper "Recovering OpenSSL
      ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack"
      by Yuval Yarom and Naomi Benger. Details can be obtained from:
      http://eprint.iacr.org/2014/140
      
      Thanks to Yuval Yarom and Naomi Benger for discovering this
      flaw and to Yuval Yarom for supplying a fix.
      (cherry picked from commit 2198be3483259de374f91e57d247d0fc667aef29)
      
      Conflicts:
      
      	CHANGES
      f9b6c0ba
  25. 04 1月, 2014 1 次提交
  26. 21 12月, 2013 1 次提交
    • D
      Fix DTLS retransmission from previous session. · 20b82b51
      Dr. Stephen Henson 提交于
      For DTLS we might need to retransmit messages from the previous session
      so keep a copy of write context in DTLS retransmission buffers instead
      of replacing it after sending CCS. CVE-2013-6450.
      (cherry picked from commit 34628967f1e65dc8f34e000f0f5518e21afbfc7b)
      20b82b51
  27. 13 12月, 2013 1 次提交
  28. 07 11月, 2013 1 次提交
    • D
      Experimental workaround TLS filler (WTF) extension. · 0467ea68
      Dr. Stephen Henson 提交于
      Based on a suggested workaround for the "TLS hang bug" (see FAQ and PR#2771):
      if the TLS Client Hello record length value would otherwise be > 255 and less
      that 512 pad with a dummy extension containing zeroes so it is at least 512.
      
      To enable it use an unused extension number (for example 0x4242) using
      e.g. -DTLSEXT_TYPE_wtf=0x4242
      
      WARNING: EXPERIMENTAL, SUBJECT TO CHANGE.
      0467ea68
  29. 22 10月, 2013 1 次提交
  30. 18 9月, 2013 1 次提交
  31. 17 9月, 2013 2 次提交