Skip to content
  1. Jun 10, 2014
    • Hubert Kario's avatar
      backport changes to ciphers(1) man page · 4ceddeea
      Hubert Kario authored
      Backport of patch:
      add ECC strings to ciphers(1), point out difference between DH and ECDH
      
      and backport of other other assorted fixes to this man page
      
       * Make a clear distinction between DH and ECDH key exchange.
       * Group all key exchange cipher suite identifiers, first DH then ECDH
       * add descriptions for all supported *DH* identifiers
       * add ECDSA authentication descriptions
       * add example showing how to disable all suites that offer no
         authentication or encryption
       * update status of static DH (it's now supported)
       * backport descriptions of AES128, AES256, AESGCM
       * backport descriptions of CAMELLIA128, CAMELLIA256
       * backport listing of standard names for ECC cipher suites
         and TLSv1.2 cipher suites
       * backport description of PSK cipher suites
      4ceddeea
    • Mike Bland's avatar
      Create test/testutil.h for unit test helper macros · 2fddc5fc
      Mike Bland authored
      Defines SETUP_TEST_FIXTURE and EXECUTE_TEST, and updates ssl/heartbeat_test.c
      using these macros. SETUP_TEST_FIXTURE makes use of the new TEST_CASE_NAME
      macro, defined to use __func__ or __FUNCTION__ on platforms that support those
      symbols, or to use the file name and line number otherwise. This should fix
      several reported build problems related to lack of C99 support.
      2fddc5fc
    • Dr. Stephen Henson's avatar
      Remove experimental DANE code. · e3beef1e
      Dr. Stephen Henson authored
      Remove experimental DANE/dnssec code: not ready for use in an
      official release yet.
      e3beef1e
    • Dr. Stephen Henson's avatar
      Fix null pointer errors. · cea5a1d5
      Dr. Stephen Henson authored
      PR#3394
      (cherry picked from commit 7a9d59c1)
      cea5a1d5
  2. Jun 09, 2014
    • Dr. Stephen Henson's avatar
      SRP ciphersuite correction. · f472ada0
      Dr. Stephen Henson authored
      SRP ciphersuites do not have no authentication. They have authentication
      based on SRP. Add new SRP authentication flag and cipher string.
      (cherry picked from commit a86b88acc373ac1fb0ca709a5fb8a8fa74683f67)
      f472ada0
    • Dr. Stephen Henson's avatar
      Update strength_bits for 3DES. · 05b22104
      Dr. Stephen Henson authored
      Fix strength_bits to 112 for 3DES.
      (cherry picked from commit 837c203719205ab19b5609b2df7151be8df05687)
      05b22104
  3. Jun 08, 2014
  4. Jun 07, 2014
  5. Jun 05, 2014
    • Dr. Stephen Henson's avatar
      Fix for CVE-2014-0195 · eb6508d5
      Dr. Stephen Henson authored
      A buffer overrun attack can be triggered by sending invalid DTLS fragments
      to an OpenSSL DTLS client or server. This is potentially exploitable to
      run arbitrary code on a vulnerable client or server.
      
      Fixed by adding consistency check for DTLS fragments.
      
      Thanks to Jüri Aedla for reporting this issue.
      (cherry picked from commit 1632ef74)
      eb6508d5
    • Dr. Stephen Henson's avatar
      Fix for CVE-2014-0224 · 77719aef
      Dr. Stephen Henson authored
      Only accept change cipher spec when it is expected instead of at any
      time. This prevents premature setting of session keys before the master
      secret is determined which an attacker could use as a MITM attack.
      
      Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for reporting this issue
      and providing the initial fix this patch is based on.
      (cherry picked from commit bc8923b1)
      77719aef
    • Dr. Stephen Henson's avatar
      Additional CVE-2014-0224 protection. · 9d2c9dd1
      Dr. Stephen Henson authored
      Return a fatal error if an attempt is made to use a zero length
      master secret.
      (cherry picked from commit 006cd708)
      9d2c9dd1
    • Dr. Stephen Henson's avatar
      Fix CVE-2014-0221 · 8942b92c
      Dr. Stephen Henson authored
      Unnecessary recursion when receiving a DTLS hello request can be used to
      crash a DTLS client. Fixed by handling DTLS hello request without recursion.
      
      Thanks to Imre Rad (Search-Lab Ltd.) for discovering this issue.
      (cherry picked from commit d3152655)
      8942b92c
    • Dr. Stephen Henson's avatar
      Fix CVE-2014-3470 · e5f70659
      Dr. Stephen Henson authored
      Check session_cert is not NULL before dereferencing it.
      (cherry picked from commit 8011cd56)
      e5f70659
  6. Jun 03, 2014
  7. Jun 02, 2014
  8. Jun 01, 2014
  9. May 30, 2014
  10. May 29, 2014
  11. May 25, 2014
  12. May 24, 2014
  13. May 23, 2014
  14. May 22, 2014
  15. May 21, 2014