- May 11, 2012
-
-
Dr. Stephen Henson authored
Reported by: Phil Pennock <openssl-dev@spodhuis.org> Make renegotiation work for TLS 1.2, 1.1 by not using a lower record version client hello workaround if renegotiating.
-
- May 10, 2012
-
-
Ben Laurie authored
-
Ben Laurie authored
-
Dr. Stephen Henson authored
Submitted by: PK <runningdoglackey@yahoo.com> Correct ciphersuite signature algorithm definitions.
-
Dr. Stephen Henson authored
DTLS to fix DoS attack. Thanks to Codenomicon for discovering this issue using Fuzz-o-Matic fuzzing as a service testing platform. (CVE-2012-2333)
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
Make sure tkeylen is initialised properly when encrypting CMS messages.
-
- May 04, 2012
-
-
Richard Levitte authored
-
- Apr 28, 2012
-
-
Andy Polyakov authored
-
- Apr 27, 2012
-
-
Andy Polyakov authored
of digest algorithms, mosty SHA, on Power7. Mystery of century, why SHA, why slower algorithm are affected more... PR: 2794 Submitted by: Ashley Lai
-
- Apr 26, 2012
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
- Apr 25, 2012
-
-
Dr. Stephen Henson authored
OpenSSL 1.0.0. Add CHANGES entry noting the consequences.
-
Andy Polyakov authored
vector contiguous. PR: 2802
-
- Apr 24, 2012
-
-
Dr. Stephen Henson authored
Reviewed by: steve Improved localisation of TLS extension handling and code tidy.
-
- Apr 23, 2012
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
- Apr 22, 2012
-
-
Andy Polyakov authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
Submitted by: Dominik Oepen <oepen@informatik.hu-berlin.de> Add Brainpool curves from RFC5639. Original patch by Annie Yousar <a.yousar@informatik.hu-berlin.de>
-
- Apr 19, 2012
-
-
Andy Polyakov authored
PR: 2792
-
Dr. Stephen Henson authored
BUF_mem_grow and BUF_mem_grow_clean. Refuse attempts to shrink buffer in CRYPTO_realloc_clean. Thanks to Tavis Ormandy, Google Security Team, for discovering this issue and to Adam Langley <agl@chromium.org> for fixing it. (CVE-2012-2110)
-
Dr. Stephen Henson authored
-
Andy Polyakov authored
PR: 2793
-
- Apr 18, 2012
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Andy Polyakov authored
e_aes_cbc_hmac_sha1.c (mostly for aesthetic reasons).
-
Andy Polyakov authored
PR: 2792
-
Andy Polyakov authored
tested, because kernel is not in shape to handle it *yet*. The code is committed mostly to stimulate the kernel development.
-
- Apr 17, 2012
-
-
Bodo Möller authored
(TLS 1.2 clients could end up negotiating these with an OpenSSL server with TLS 1.2 disabled, which is problematic.) Submitted by: Adam Langley
-
Dr. Stephen Henson authored
If OPENSSL_MAX_TLS1_2_CIPHER_LENGTH is set then limit the size of client ciphersuites to this value. A value of 50 should be sufficient. Document workarounds in CHANGES.
-
Dr. Stephen Henson authored
Some servers hang when presented with a client hello record length exceeding 255 bytes but will work with longer client hellos if the TLS record version in client hello does not exceed TLS v1.0. Unfortunately this doesn't fix all cases...
-
- Apr 16, 2012
-
-
Andy Polyakov authored
PR: 2791 Submitted by: Ben Noordhuis
-
Andy Polyakov authored
PR: 2790 Submitted by: Alexei Khlebnikov
-
- Apr 15, 2012
-
-
Andy Polyakov authored
PR: 2538
-