1. 12 5月, 2014 1 次提交
  2. 11 5月, 2014 2 次提交
  3. 23 4月, 2014 1 次提交
  4. 15 2月, 2014 1 次提交
  5. 06 2月, 2014 1 次提交
  6. 05 2月, 2014 2 次提交
  7. 02 1月, 2014 1 次提交
  8. 18 12月, 2013 1 次提交
  9. 09 10月, 2013 1 次提交
  10. 08 9月, 2013 1 次提交
    • D
      Experimental encrypt-then-mac support. · 5e3ff62c
      Dr. Stephen Henson 提交于
      Experimental support for encrypt then mac from
      draft-gutmann-tls-encrypt-then-mac-02.txt
      
      To enable it set the appropriate extension number (0x10 for the test server)
      using e.g. -DTLSEXT_TYPE_encrypt_then_mac=0x10
      
      For non-compliant peers (i.e. just about everything) this should have no
      effect.
      5e3ff62c
  11. 06 9月, 2013 1 次提交
  12. 14 6月, 2013 1 次提交
  13. 18 3月, 2013 1 次提交
  14. 27 2月, 2013 1 次提交
  15. 08 2月, 2013 1 次提交
  16. 06 2月, 2013 5 次提交
    • A
      ssl/*: remove SSL3_RECORD->orig_len to restore binary compatibility. · 2aec073a
      Andy Polyakov 提交于
      Kludge alert. This is arranged by passing padding length in unused
      bits of SSL3_RECORD->type, so that orig_len can be reconstructed.
      (cherry picked from commit 8bfd4c659f180a6ce34f21c0e62956b362067fba)
      2aec073a
    • B
      Update DTLS code to match CBC decoding in TLS. · e33ac0e7
      Ben Laurie 提交于
      This change updates the DTLS code to match the constant-time CBC
      behaviour in the TLS.
      (cherry picked from commit 9f27de170d1b7bef3d46d41382dc4dafde8b3900)
      e33ac0e7
    • B
      Don't crash when processing a zero-length, TLS >= 1.1 record. · 93cab6b3
      Ben Laurie 提交于
      The previous CBC patch was bugged in that there was a path through enc()
      in s3_pkt.c/d1_pkt.c which didn't set orig_len. orig_len would be left
      at the previous value which could suggest that the packet was a
      sufficient length when it wasn't.
      (cherry picked from commit 6cb19b7681f600b2f165e4adc57547b097b475fd)
      93cab6b3
    • B
      Make CBC decoding constant time. · 2acc020b
      Ben Laurie 提交于
      This patch makes the decoding of SSLv3 and TLS CBC records constant
      time. Without this, a timing side-channel can be used to build a padding
      oracle and mount Vaudenay's attack.
      
      This patch also disables the stitched AESNI+SHA mode pending a similar
      fix to that code.
      
      In order to be easy to backport, this change is implemented in ssl/,
      rather than as a generic AEAD mode. In the future this should be changed
      around so that HMAC isn't in ssl/, but crypto/ as FIPS expects.
      (cherry picked from commit e130841bccfc0bb9da254dc84e23bc6a1c78a64e)
      2acc020b
    • B
      Add and use a constant-time memcmp. · 7c770d57
      Ben Laurie 提交于
      This change adds CRYPTO_memcmp, which compares two vectors of bytes in
      an amount of time that's independent of their contents. It also changes
      several MAC compares in the code to use this over the standard memcmp,
      which may leak information about the size of a matching prefix.
      (cherry picked from commit 2ee798880a246d648ecddadc5b91367bee4a5d98)
      7c770d57
  17. 08 12月, 2012 1 次提交
  18. 11 5月, 2012 1 次提交
    • D
      PR: 2811 · c3b13033
      Dr. Stephen Henson 提交于
      Reported by: Phil Pennock <openssl-dev@spodhuis.org>
      
      Make renegotiation work for TLS 1.2, 1.1 by not using a lower record
      version client hello workaround if renegotiating.
      c3b13033
  19. 17 4月, 2012 1 次提交
    • D
      Partial workaround for PR#2771. · 293706e7
      Dr. Stephen Henson 提交于
      Some servers hang when presented with a client hello record length exceeding
      255 bytes but will work with longer client hellos if the TLS record version
      in client hello does not exceed TLS v1.0. Unfortunately this doesn't fix all
      cases...
      293706e7
  20. 15 4月, 2012 1 次提交
  21. 01 1月, 2012 1 次提交
    • D
      PR: 2658 · 4817504d
      Dr. Stephen Henson 提交于
      Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de>
      Reviewed by: steve
      
      Support for TLS/DTLS heartbeats.
      4817504d
  22. 25 9月, 2011 1 次提交
  23. 03 8月, 2011 1 次提交
  24. 25 5月, 2011 2 次提交
    • D
      PR: 2533 · 3d52f1d5
      Dr. Stephen Henson 提交于
      Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de>
      Reviewed by: steve
      
      Setting SSL_MODE_RELEASE_BUFFERS should be ignored for DTLS, but instead causes
      the program to crash. This is due to missing version checks and is fixed with
      this patch.
      3d52f1d5
    • D
      Some nextproto patches broke DTLS: fix · bbcf3a9b
      Dr. Stephen Henson 提交于
      bbcf3a9b
  25. 30 4月, 2011 1 次提交
  26. 13 3月, 2011 1 次提交
  27. 15 11月, 2010 1 次提交
  28. 06 9月, 2010 1 次提交
  29. 26 8月, 2010 1 次提交
    • D
      PR: 1833 · 44959ee4
      Dr. Stephen Henson 提交于
      Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de>
      
      Support for abbreviated handshakes when renegotiating.
      44959ee4
  30. 28 7月, 2010 1 次提交
  31. 25 3月, 2010 1 次提交
  32. 29 1月, 2010 1 次提交
  33. 27 1月, 2010 1 次提交
    • D
      PR: 1949 · d5e7f2f2
      Dr. Stephen Henson 提交于
      Submitted by: steve@openssl.org
      
      More robust fix and workaround for PR#1949. Don't try to work out if there
      is any write pending data as this can be unreliable: always flush.
      d5e7f2f2