1. 15 Oct, 2014 7 commits
  2. 10 Oct, 2014 1 commit
    • Dr. Stephen Henson's avatar
      Preserve digests for SNI. · 4e05aedb
      Dr. Stephen Henson authored
      
      
      SSL_set_SSL_CTX is normally called for SNI after ClientHello has
      received and the digest to use for each certificate has been decided.
      The original ssl->cert contains the negotiated digests and is now
      copied to the new ssl->cert.
      
      PR: 3560
      Reviewed-by: default avatarTim Hudson <tjh@openssl.org>
      4e05aedb
  3. 06 Oct, 2014 1 commit
  4. 29 Sep, 2014 1 commit
    • Dr. Stephen Henson's avatar
      Add additional DigestInfo checks. · 55614f89
      Dr. Stephen Henson authored
      
      
      Reencode DigestInto in DER and check against the original: this
      will reject any improperly encoded DigestInfo structures.
      
      Note: this is a precautionary measure, there is no known attack
      which can exploit this.
      
      Thanks to Brian Smith for reporting this issue.
      Reviewed-by: default avatarTim Hudson <tjh@openssl.org>
      55614f89
  5. 25 Sep, 2014 1 commit
  6. 24 Sep, 2014 6 commits
  7. 21 Sep, 2014 1 commit
  8. 10 Sep, 2014 1 commit
  9. 08 Sep, 2014 1 commit
  10. 05 Sep, 2014 1 commit
    • Adam Langley's avatar
      psk_client_callback, 128-byte id bug. · 13ce52be
      Adam Langley authored
      
      
      Fix a bug in handling of 128 byte long PSK identity in
      psk_client_callback.
      
      OpenSSL supports PSK identities of up to (and including) 128 bytes in
      length. PSK identity is obtained via the psk_client_callback,
      implementors of which are expected to provide a NULL-terminated
      identity. However, the callback is invoked with only 128 bytes of
      storage thus making it impossible to return a 128 byte long identity and
      the required additional NULL byte.
      
      This CL fixes the issue by passing in a 129 byte long buffer into the
      psk_client_callback. As a safety precaution, this CL also zeroes out the
      buffer before passing it into the callback, uses strnlen for obtaining
      the length of the identity returned by the callback, and aborts the
      handshake if the identity (without the NULL terminator) is longer than
      128 bytes.
      
      (Original patch amended to achieve strnlen in a different way.)
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      (cherry picked from commit be0d8517)
      13ce52be
  11. 04 Sep, 2014 1 commit
  12. 03 Sep, 2014 2 commits
  13. 02 Sep, 2014 1 commit
  14. 30 Aug, 2014 4 commits
  15. 29 Aug, 2014 1 commit
  16. 28 Aug, 2014 3 commits
  17. 27 Aug, 2014 4 commits
  18. 26 Aug, 2014 1 commit
  19. 25 Aug, 2014 1 commit
  20. 24 Aug, 2014 1 commit