1. 16 May, 2012 2 commits
  2. 13 May, 2012 1 commit
  3. 11 May, 2012 2 commits
    • Dr. Stephen Henson's avatar
      PR: 2813 · 482f2380
      Dr. Stephen Henson authored
      Reported by: Constantine Sapuntzakis <csapuntz@gmail.com>
      
      Fix possible deadlock when decoding public keys.
      482f2380
    • Dr. Stephen Henson's avatar
      PR: 2811 · 5e145e54
      Dr. Stephen Henson authored
      Reported by: Phil Pennock <openssl-dev@spodhuis.org>
      
      Make renegotiation work for TLS 1.2, 1.1 by not using a lower record
      version client hello workaround if renegotiating.
      5e145e54
  4. 10 May, 2012 4 commits
  5. 04 May, 2012 1 commit
  6. 27 Apr, 2012 1 commit
  7. 26 Apr, 2012 3 commits
  8. 25 Apr, 2012 2 commits
  9. 24 Apr, 2012 1 commit
  10. 22 Apr, 2012 5 commits
  11. 20 Apr, 2012 3 commits
  12. 19 Apr, 2012 4 commits
  13. 18 Apr, 2012 4 commits
  14. 17 Apr, 2012 3 commits
    • Bodo Möller's avatar
      Disable SHA-2 ciphersuites in < TLS 1.2 connections. · bb3add20
      Bodo Möller authored
      (TLS 1.2 clients could end up negotiating these with an OpenSSL server
      with TLS 1.2 disabled, which is problematic.)
      
      Submitted by: Adam Langley
      bb3add20
    • Dr. Stephen Henson's avatar
      Additional workaround for PR#2771 · 48e0f666
      Dr. Stephen Henson authored
      If OPENSSL_MAX_TLS1_2_CIPHER_LENGTH is set then limit the size of client
      ciphersuites to this value. A value of 50 should be sufficient.
      
      Document workarounds in CHANGES.
      48e0f666
    • Dr. Stephen Henson's avatar
      Partial workaround for PR#2771. · 32213fb2
      Dr. Stephen Henson authored
      Some servers hang when presented with a client hello record length exceeding
      255 bytes but will work with longer client hellos if the TLS record version
      in client hello does not exceed TLS v1.0. Unfortunately this doesn't fix all
      cases...
      32213fb2
  15. 16 Apr, 2012 2 commits
  16. 15 Apr, 2012 2 commits