- Jun 09, 2014
-
-
Dr. Stephen Henson authored
SRP ciphersuites do not have no authentication. They have authentication based on SRP. Add new SRP authentication flag and cipher string.
-
Dr. Stephen Henson authored
Fix strength_bits to 112 for 3DES.
-
- Jun 08, 2014
-
-
Kurt Roeckx authored
It's using an internal API that that might not be available in the shared library.
-
Jakub Wilk authored
Because of a missing include <fcntl.h> we don't have O_CREATE and don't create the file with open() using mode 0600 but fall back to using fopen() with the default umask followed by a chmod(). Problem found by Jakub Wilk <jwilk@debian.org>.
-
- Jun 07, 2014
-
-
Dr. Stephen Henson authored
If application uses tls_session_secret_cb for session resumption set the CCS_OK flag.
-
Dr. Stephen Henson authored
Encrypt then MAC now has an official extension value, see: http://www.ietf.org/id/draft-ietf-tls-encrypt-then-mac-02.txt
-
Matt Caswell authored
-
- Jun 06, 2014
-
-
Andy Polyakov authored
Pointer out and suggested by: Ard Biesheuvel.
-
Andy Polyakov authored
Submitted by: Ard Biesheuvel.
-
Andy Polyakov authored
-
Andy Polyakov authored
Result of joint effort with Ard Biesheuvel.
-
Dr. Stephen Henson authored
-
Andy Polyakov authored
- fix 32-bit build (submitted by Ard Biesheuvel); - fix performance issue in CTR;
-
- Jun 05, 2014
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
A buffer overrun attack can be triggered by sending invalid DTLS fragments to an OpenSSL DTLS client or server. This is potentially exploitable to run arbitrary code on a vulnerable client or server. Fixed by adding consistency check for DTLS fragments. Thanks to Jüri Aedla for reporting this issue. (cherry picked from commit 1632ef74)
-
Dr. Stephen Henson authored
Only accept change cipher spec when it is expected instead of at any time. This prevents premature setting of session keys before the master secret is determined which an attacker could use as a MITM attack. Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for reporting this issue and providing the initial fix this patch is based on. (cherry picked from commit bc8923b1)
-
Dr. Stephen Henson authored
Return a fatal error if an attempt is made to use a zero length master secret. (cherry picked from commit 006cd708)
-
Dr. Stephen Henson authored
Unnecessary recursion when receiving a DTLS hello request can be used to crash a DTLS client. Fixed by handling DTLS hello request without recursion. Thanks to Imre Rad (Search-Lab Ltd.) for discovering this issue. (cherry picked from commit d3152655)
-
Dr. Stephen Henson authored
Check session_cert is not NULL before dereferencing it. (cherry picked from commit 8011cd56)
-
- Jun 04, 2014
-
-
Andy Polyakov authored
-
Andy Polyakov authored
-
- Jun 03, 2014
-
-
Libor Krystek authored
-
- Jun 02, 2014
-
-
David Benjamin authored
-
zhu qun-ying authored
PR#3286
-
Andy Polyakov authored
Submitted by: Ard Biesheuvel.
-
Dr. Stephen Henson authored
Add certificates if -nocerts and -certfile specified when signing in smime application. This can be used this to specify the order certificates appear in the PKCS#7 structure: some broken applications require a certain ordering. PR#3316
-
Sami Farin authored
PR#3302
-
- Jun 01, 2014
-
-
Andy Polyakov authored
-
Matt Caswell authored
-
David Ramos authored
Delays the queue insertion until after the ssl3_setup_buffers() call due to use-after-free bug. PR#3362
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
Add TLS padding extension to SSL_OP_ALL so it is used with other "bugs" options and can be turned off. This replaces SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG which is an ancient option referring to SSLv2 and SSLREF. PR#3336
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
armcap.c is shared between 32- and 64-bit builds and features link-time detection of getauxval. Submitted by: Ard Biesheuvel.
-
Ben Laurie authored
-
Ben Laurie authored
Closes #116.
-