- Jun 08, 2014
-
-
Kurt Roeckx authored
It's using an internal API that that might not be available in the shared library.
-
Jakub Wilk authored
Because of a missing include <fcntl.h> we don't have O_CREATE and don't create the file with open() using mode 0600 but fall back to using fopen() with the default umask followed by a chmod(). Problem found by Jakub Wilk <jwilk@debian.org>.
-
- Jun 07, 2014
-
-
Dr. Stephen Henson authored
If application uses tls_session_secret_cb for session resumption set the CCS_OK flag. (cherry picked from commit 953c592572e8811b7956cc09fbd8e98037068b58)
-
Dr. Stephen Henson authored
-
Matt Caswell authored
-
- Jun 05, 2014
-
-
Dr. Stephen Henson authored
A buffer overrun attack can be triggered by sending invalid DTLS fragments to an OpenSSL DTLS client or server. This is potentially exploitable to run arbitrary code on a vulnerable client or server. Fixed by adding consistency check for DTLS fragments. Thanks to Jüri Aedla for reporting this issue. (cherry picked from commit 1632ef74)
-
Dr. Stephen Henson authored
Only accept change cipher spec when it is expected instead of at any time. This prevents premature setting of session keys before the master secret is determined which an attacker could use as a MITM attack. Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for reporting this issue and providing the initial fix this patch is based on. (cherry picked from commit bc8923b1)
-
Dr. Stephen Henson authored
Return a fatal error if an attempt is made to use a zero length master secret. (cherry picked from commit 006cd708)
-
Dr. Stephen Henson authored
Unnecessary recursion when receiving a DTLS hello request can be used to crash a DTLS client. Fixed by handling DTLS hello request without recursion. Thanks to Imre Rad (Search-Lab Ltd.) for discovering this issue. (cherry picked from commit d3152655)
-
Dr. Stephen Henson authored
Check session_cert is not NULL before dereferencing it. (cherry picked from commit 8011cd56)
-
- Jun 03, 2014
-
-
Libor Krystek authored
-
- Jun 02, 2014
-
-
David Benjamin authored
(cherry picked from commit 7d89b3bf42e4b4067371ab33ef7631434e41d1e4)
-
zhu qun-ying authored
PR#3286 (cherry picked from commit 71e95000afb2227fe5cac1c79ae884338bcd8d0b)
-
Dr. Stephen Henson authored
Add certificates if -nocerts and -certfile specified when signing in smime application. This can be used this to specify the order certificates appear in the PKCS#7 structure: some broken applications require a certain ordering. PR#3316 (cherry picked from commit e114abee9ec084a56c1d6076ac6de8a7a3a5cf34)
-
Sami Farin authored
PR#3302 (cherry picked from commit 9717f01951f976f76dd40a38d9fc7307057fa4c4)
-
- Jun 01, 2014
-
-
Matt Caswell authored
-
David Ramos authored
Delays the queue insertion until after the ssl3_setup_buffers() call due to use-after-free bug. PR#3362
-
Dr. Stephen Henson authored
(cherry picked from commit ea2bb861f0daaa20819bf9ac8c146f7593feacd4) Conflicts: apps/s_cb.c
-
Dr. Stephen Henson authored
Add TLS padding extension to SSL_OP_ALL so it is used with other "bugs" options and can be turned off. This replaces SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG which is an ancient option referring to SSLv2 and SSLREF. PR#3336 (cherry picked from commit 758415b2259fa45d3fe17d8e53ae1341b7b6e482) Conflicts: ssl/t1_lib.c
-
Dr. Stephen Henson authored
(cherry picked from commit 3009244d)
-
David Ramos authored
Make sure there is an extra 4 bytes for server done message when NETSCAPE_HANG_BUG is defined. PR#3361 (cherry picked from commit 92d81ba6)
-
David Ramos authored
PR#3313 (cherry picked from commit 7e2c6f7e)
-
- May 30, 2014
-
-
Dr. Stephen Henson authored
PR#3319 (cherry picked from commit 84691390eae86befd33c83721dacedb539ae34e6)
-
Dr. Stephen Henson authored
(cherry picked from commit 2c575907d2c8601a18716f718ce309ed4e1f1783)
-
- May 29, 2014
-
-
Dr. Stephen Henson authored
PR#3249 (cherry picked from commit 8909bf20269035d295743fca559207ef2eb84eb3)
-
František Bořánek authored
PR#3278 (cherry picked from commit de56fe797081fc09ebd1add06d6e2df42a324fd5)
-
Martin Kaiser authored
(cherry picked from commit 3820fec3a09faecba7fe9912aa20ef7fcda8337b)
-
- May 25, 2014
-
-
Matt Caswell authored
-
- May 24, 2014
-
-
Ben Laurie authored
-
- May 23, 2014
-
-
Andy Polyakov authored
(cherry picked from commit b83d09f5)
-
- May 22, 2014
-
-
Mike Bland authored
Replaces the entire test with a trivial implementation when OPENSSL_NO_HEARTBEATS is defined.
-
Ben Laurie authored
-
- May 21, 2014
-
-
Matt Caswell authored
-
Matt Caswell authored
-
Ben Laurie authored
-
Ben Laurie authored
-
Viktor Dukhovni authored
Fixes to host checking wild card support and add support for setting host checking flags when verifying a certificate chain. (cherry picked from commit 397a8e74)
-
Dr. Stephen Henson authored
Use triple DES for certificate encryption if no-rc2 is specified. PR#3357
-
Dr. Stephen Henson authored
PR#3357 (cherry picked from commit ca3ffd9670f2b589bf8cc04923f953e06d6fbc58)
-
- May 20, 2014
-
-
Ben Laurie authored
-