1. 05 9月, 2014 1 次提交
  2. 15 8月, 2014 1 次提交
  3. 02 8月, 2014 2 次提交
  4. 01 8月, 2014 1 次提交
  5. 23 7月, 2014 1 次提交
  6. 04 7月, 2014 1 次提交
  7. 01 6月, 2014 1 次提交
  8. 24 5月, 2014 1 次提交
  9. 26 4月, 2014 2 次提交
    • M
      Fix version documentation. · 8acb9538
      mancha 提交于
      Specify -f is for compilation flags. Add -d to synopsis section.
      
      Closes #77.
      8acb9538
    • M
      Fix eckey_priv_encode() · e14f14d3
      mancha 提交于
      Fix eckey_priv_encode to return an error on failure of i2d_ECPrivateKey.
      e14f14d3
  10. 22 4月, 2014 1 次提交
  11. 08 4月, 2014 1 次提交
    • D
      Add heartbeat extension bounds check. · 731f4314
      Dr. Stephen Henson 提交于
      A missing bounds check in the handling of the TLS heartbeat extension
      can be used to reveal up to 64k of memory to a connected client or
      server.
      
      Thanks for Neel Mehta of Google Security for discovering this bug and to
      Adam Langley <agl@chromium.org> and Bodo Moeller <bmoeller@acm.org> for
      preparing the fix (CVE-2014-0160)
      (cherry picked from commit 96db9023b881d7cd9f379b0c154650d6c108e9a3)
      731f4314
  12. 06 4月, 2014 1 次提交
  13. 01 4月, 2014 1 次提交
  14. 12 3月, 2014 1 次提交
    • D
      Fix for CVE-2014-0076 · f9b6c0ba
      Dr. Stephen Henson 提交于
      Fix for the attack described in the paper "Recovering OpenSSL
      ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack"
      by Yuval Yarom and Naomi Benger. Details can be obtained from:
      http://eprint.iacr.org/2014/140
      
      Thanks to Yuval Yarom and Naomi Benger for discovering this
      flaw and to Yuval Yarom for supplying a fix.
      (cherry picked from commit 2198be3483259de374f91e57d247d0fc667aef29)
      
      Conflicts:
      
      	CHANGES
      f9b6c0ba
  15. 04 1月, 2014 1 次提交
  16. 21 12月, 2013 1 次提交
    • D
      Fix DTLS retransmission from previous session. · 20b82b51
      Dr. Stephen Henson 提交于
      For DTLS we might need to retransmit messages from the previous session
      so keep a copy of write context in DTLS retransmission buffers instead
      of replacing it after sending CCS. CVE-2013-6450.
      (cherry picked from commit 34628967f1e65dc8f34e000f0f5518e21afbfc7b)
      20b82b51
  17. 13 12月, 2013 1 次提交
  18. 07 11月, 2013 1 次提交
    • D
      Experimental workaround TLS filler (WTF) extension. · 0467ea68
      Dr. Stephen Henson 提交于
      Based on a suggested workaround for the "TLS hang bug" (see FAQ and PR#2771):
      if the TLS Client Hello record length value would otherwise be > 255 and less
      that 512 pad with a dummy extension containing zeroes so it is at least 512.
      
      To enable it use an unused extension number (for example 0x4242) using
      e.g. -DTLSEXT_TYPE_wtf=0x4242
      
      WARNING: EXPERIMENTAL, SUBJECT TO CHANGE.
      0467ea68
  19. 22 10月, 2013 1 次提交
  20. 18 9月, 2013 1 次提交
  21. 17 9月, 2013 2 次提交
  22. 16 9月, 2013 1 次提交
  23. 14 9月, 2013 1 次提交
  24. 08 9月, 2013 2 次提交
  25. 06 9月, 2013 2 次提交
    • S
      Add callbacks supporting generation and retrieval of supplemental data... · 36086186
      Scott Deboy 提交于
      Add callbacks supporting generation and retrieval of supplemental data entries, facilitating RFC 5878 (TLS auth extensions)
      Removed prior audit proof logic - audit proof support was implemented using the generic TLS extension API
      Tests exercising the new supplemental data registration and callback api can be found in ssltest.c.
      Implemented changes to s_server and s_client to exercise supplemental data callbacks via the -auth argument, as well as additional flags to exercise supplemental data being sent only during renegotiation.
      36086186
    • V
      478b50cf
  26. 18 7月, 2013 1 次提交
    • D
      EVP support for wrapping algorithms. · 97cf1f6c
      Dr. Stephen Henson 提交于
      Add support for key wrap algorithms via EVP interface.
      
      Generalise AES wrap algorithm and add to modes, making existing
      AES wrap algorithm a special case.
      
      Move test code to evptests.txt
      97cf1f6c
  27. 05 7月, 2013 1 次提交
  28. 22 6月, 2013 1 次提交
  29. 13 6月, 2013 2 次提交
  30. 09 4月, 2013 1 次提交
    • D
      Dual DTLS version methods. · c6913eeb
      Dr. Stephen Henson 提交于
      Add new methods DTLS_*_method() which support both DTLS 1.0 and DTLS 1.2 and
      pick the highest version the peer supports during negotiation.
      
      As with SSL/TLS options can change this behaviour specifically
      SSL_OP_NO_DTLSv1 and SSL_OP_NO_DTLSv1_2.
      c6913eeb
  31. 19 12月, 2012 1 次提交
  32. 12 12月, 2012 1 次提交
  33. 08 12月, 2012 1 次提交
  34. 07 12月, 2012 1 次提交