- 30 6月, 2014 1 次提交
-
-
由 Ben Laurie 提交于
-
- 29 6月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
PR#2531
-
- 28 6月, 2014 4 次提交
-
-
由 Dr. Stephen Henson 提交于
Some state strings were erronously not compiled when no-ssl2 was set. PR#3295
-
由 yogesh nagarkar 提交于
PR#3141
-
由 Ken Ballou 提交于
PR#3174
-
由 PK 提交于
PR#2800
-
- 27 6月, 2014 1 次提交
-
-
由 Tomas Mraz 提交于
PR#3374
-
- 23 6月, 2014 3 次提交
-
-
由 Miod Vallat 提交于
In the ssl_cipher_get_evp() function, fix off-by-one errors in index validation before accessing arrays. Bug discovered and fixed by Miod Vallat from the OpenBSD team. PR#3375
-
由 Matt Caswell 提交于
This reverts commit abfb989f. Incorrect attribution
-
由 Matt Caswell 提交于
-
- 18 6月, 2014 1 次提交
-
-
- 15 6月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Allow CCS after finished has been sent by client: at this point keys have been correctly set up so it is OK to accept CCS from server. Without this renegotiation can sometimes fail. PR#3400
-
- 13 6月, 2014 4 次提交
-
-
由 Matt Caswell 提交于
Based on an original patch by Joel Sing (OpenBSD) who also originally identified the issue.
-
由 Matt Caswell 提交于
This reverts commit 2f1dffa8. Missing attribution.
-
由 Kurt Cancemi 提交于
In the ssl_cipher_get_evp() function, fix off-by-one errors in index validation before accessing arrays. PR#3375
-
由 Matt Caswell 提交于
-
- 12 6月, 2014 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 11 6月, 2014 2 次提交
-
-
由 Matt Caswell 提交于
-
由 Mike Bland 提交于
Defines SETUP_TEST_FIXTURE and EXECUTE_TEST, and updates ssl/heartbeat_test.c using these macros. SETUP_TEST_FIXTURE makes use of the new TEST_CASE_NAME macro, defined to use __func__ or __FUNCTION__ on platforms that support those symbols, or to use the file name and line number otherwise. This should fix several reported build problems related to lack of C99 support.
-
- 10 6月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
PR#3394
-
- 09 6月, 2014 2 次提交
-
-
由 Dr. Stephen Henson 提交于
SRP ciphersuites do not have no authentication. They have authentication based on SRP. Add new SRP authentication flag and cipher string.
-
由 Dr. Stephen Henson 提交于
Fix strength_bits to 112 for 3DES.
-
- 07 6月, 2014 2 次提交
-
-
由 Dr. Stephen Henson 提交于
If application uses tls_session_secret_cb for session resumption set the CCS_OK flag.
-
由 Dr. Stephen Henson 提交于
Encrypt then MAC now has an official extension value, see: http://www.ietf.org/id/draft-ietf-tls-encrypt-then-mac-02.txt
-
- 05 6月, 2014 6 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
A buffer overrun attack can be triggered by sending invalid DTLS fragments to an OpenSSL DTLS client or server. This is potentially exploitable to run arbitrary code on a vulnerable client or server. Fixed by adding consistency check for DTLS fragments. Thanks to Jüri Aedla for reporting this issue. (cherry picked from commit 1632ef744872edc2aa2a53d487d3e79c965a4ad3)
-
由 Dr. Stephen Henson 提交于
Only accept change cipher spec when it is expected instead of at any time. This prevents premature setting of session keys before the master secret is determined which an attacker could use as a MITM attack. Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for reporting this issue and providing the initial fix this patch is based on. (cherry picked from commit bc8923b1ec9c467755cd86f7848c50ee8812e441)
-
由 Dr. Stephen Henson 提交于
Return a fatal error if an attempt is made to use a zero length master secret. (cherry picked from commit 006cd7083f76ed5cb0d9a914857e9231ef1bc317)
-
由 Dr. Stephen Henson 提交于
Unnecessary recursion when receiving a DTLS hello request can be used to crash a DTLS client. Fixed by handling DTLS hello request without recursion. Thanks to Imre Rad (Search-Lab Ltd.) for discovering this issue. (cherry picked from commit d3152655d5319ce883c8e3ac4b99f8de4c59d846)
-
由 Dr. Stephen Henson 提交于
Check session_cert is not NULL before dereferencing it. (cherry picked from commit 8011cd56e39a433b1837465259a9bd24a38727fb)
-
- 03 6月, 2014 2 次提交
-
-
由 David Benjamin 提交于
-
由 zhu qun-ying 提交于
PR#3286
-
- 02 6月, 2014 4 次提交
-
-
由 Sami Farin 提交于
PR#3302
-
由 Matt Caswell 提交于
-
由 David Ramos 提交于
Delays the queue insertion until after the ssl3_setup_buffers() call due to use-after-free bug. PR#3362
-
由 Dr. Stephen Henson 提交于
Add TLS padding extension to SSL_OP_ALL so it is used with other "bugs" options and can be turned off. This replaces SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG which is an ancient option referring to SSLv2 and SSLREF. PR#3336
-
- 01 6月, 2014 1 次提交
-
-
由 David Ramos 提交于
Make sure there is an extra 4 bytes for server done message when NETSCAPE_HANG_BUG is defined. PR#3361
-
- 31 5月, 2014 2 次提交
-
-
由 Dr. Stephen Henson 提交于
PR#3319
-
由 Dr. Stephen Henson 提交于
-
- 26 5月, 2014 1 次提交
-
-
由 Juli Mallett 提交于
Closes #74.
-