- Jun 27, 2014
-
-
Dr. Stephen Henson authored
In EVP_PBE_alg_add don't use the underlying NID for the cipher as it may have a non-standard key size. PR#3206 (cherry picked from commit efb7caef637a1de8468ca109efd355a9d0e73a45)
-
Dr. Stephen Henson authored
PR#3014 (cherry picked from commit 11da66f8)
-
Tom Greenslade authored
PR#2783 (cherry picked from commit b36f35cd)
-
Tomas Mraz authored
PR#3374 (cherry picked from commit 0436369f)
-
Jeffrey Walton authored
Document that the certificate passed to SSL_CTX_add_extra_chain_cert() should not be freed by the application. PR#3409 (cherry picked from commit 0535c2d6) Add restrictions section present in other branches. Conflicts: doc/ssl/SSL_CTX_add_extra_chain_cert.pod (cherry picked from commit 86cac6d3)
-
Dr. Stephen Henson authored
PR#3403 (cherry picked from commit d2aea038)
-
Dr. Stephen Henson authored
(cherry picked from commit 7be6b27a)
-
- Jun 26, 2014
-
-
Huzaifa Sidhpurwala authored
PR#3410 (cherry picked from commit e14e764c0d5d469da63d0819c6ffc0e1e9e7f0bb)
-
Jenny Yung authored
PR#3399. (cherry picked from commit da0d5e78)
-
- Jun 22, 2014
-
-
Miod Vallat authored
In the ssl_cipher_get_evp() function, fix off-by-one errors in index validation before accessing arrays. Bug discovered and fixed by Miod Vallat from the OpenBSD team. PR#3375
-
Matt Caswell authored
This reverts commit 7e98378d. Incorrect attribution.
-
- Jun 14, 2014
-
-
Dr. Stephen Henson authored
Allow CCS after finished has been sent by client: at this point keys have been correctly set up so it is OK to accept CCS from server. Without this renegotiation can sometimes fail. PR#3400 (cherry picked from commit 99cd6a91fcb0931feaebbb4832681d40a66fad41)
-
- Jun 13, 2014
-
-
Matt Caswell authored
Based on an original patch by Joel Sing (OpenBSD) who also originally identified the issue.
-
Matt Caswell authored
This reverts commit e05282f8. Missing attribution.
-
- Jun 12, 2014
-
-
Kurt Cancemi authored
In the ssl_cipher_get_evp() function, fix off-by-one errors in index validation before accessing arrays. PR#3375
-
Ben Laurie authored
(Backported as a result of PR#3377 reported by Rainer Jung <rainer.jung@kippdata.de>)
-
- Jun 11, 2014
-
-
Dr. Stephen Henson authored
(cherry picked from commit 7239a09c7b5757ed8d0e9869f3e9b03c0e11f4d1)
-
- Jun 10, 2014
-
-
Matt Caswell authored
-
Dr. Stephen Henson authored
PR#3394 (cherry picked from commit 7a9d59c1)
-
- Jun 09, 2014
-
-
Dr. Stephen Henson authored
Fix strength_bits to 112 for 3DES.
-
- Jun 08, 2014
-
-
Jakub Wilk authored
Because of a missing include <fcntl.h> we don't have O_CREATE and don't create the file with open() using mode 0600 but fall back to using fopen() with the default umask followed by a chmod(). Problem found by Jakub Wilk <jwilk@debian.org>.
-
- Jun 07, 2014
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
If application uses tls_session_secret_cb for session resumption set the CCS_OK flag. (cherry picked from commit 953c592572e8811b7956cc09fbd8e98037068b58)
-
Matt Caswell authored
-
- Jun 06, 2014
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
- Jun 05, 2014
-
-
Matt Caswell authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
- Jun 03, 2014
-
-
Dr. Stephen Henson authored
Check session_cert is not NULL before dereferencing it.
-
Dr. Stephen Henson authored
Unnecessary recursion when receiving a DTLS hello request can be used to crash a DTLS client. Fixed by handling DTLS hello request without recursion. Thanks to Imre Rad (Search-Lab Ltd.) for discovering this issue.
-
Dr. Stephen Henson authored
Return a fatal error if an attempt is made to use a zero length master secret.
-
Dr. Stephen Henson authored
Only accept change cipher spec when it is expected instead of at any time. This prevents premature setting of session keys before the master secret is determined which an attacker could use as a MITM attack. Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for reporting this issue and providing the initial fix this patch is based on.
-
Dr. Stephen Henson authored
A buffer overrun attack can be triggered by sending invalid DTLS fragments to an OpenSSL DTLS client or server. This is potentially exploitable to run arbitrary code on a vulnerable client or server. Fixed by adding consistency check for DTLS fragments. Thanks to Jüri Aedla for reporting this issue.
-
- Jun 02, 2014
-
-
zhu qun-ying authored
PR#3286 (cherry picked from commit 71e95000afb2227fe5cac1c79ae884338bcd8d0b)
-
Dr. Stephen Henson authored
As documented PKCS7_NOCERTS should only exclude the signer's certificate and not any supplied in the "certs" parameter. This makes it possible to exclude the signer's certificate but include other certificates. Applications that don't want to include other certificates should set "certs" to NULL anyway. (cherry picked from commit 5c6f808b66f1a2e0fb2a508b24b845a88803fe3a)
-
Annie Yousar authored
PR#2677.
-
Sami Farin authored
PR#3302 (cherry picked from commit 9717f01951f976f76dd40a38d9fc7307057fa4c4)
-