- Jun 12, 2014
-
-
Richard Levitte authored
-
- Jun 11, 2014
-
-
Andy Polyakov authored
(cherry picked from commit 77a27a50)
-
Dr. Stephen Henson authored
(cherry picked from commit 7239a09c7b5757ed8d0e9869f3e9b03c0e11f4d1)
-
Andy Polyakov authored
(cherry picked from commit 1cf8f57b)
-
Andy Polyakov authored
(cherry picked from commit 619b9466)
-
- Jun 10, 2014
-
-
Rob Stradling authored
(cherry picked from commit fd2309aa)
-
Matt Caswell authored
-
Andy Polyakov authored
(cherry picked from commit 82741e9c)
-
Andy Polyakov authored
Result of joint effort with Ard Biesheuvel. (cherry picked from commit 2d5a799d)
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
Submitted by: Ard Biesheuvel. (cherry picked from commit cd91fd7c)
-
Andy Polyakov authored
(cherry picked from commit f8aab617)
-
Andy Polyakov authored
(cherry picked from commit ddb6b965)
-
Andy Polyakov authored
armcap.c is shared between 32- and 64-bit builds and features link-time detection of getauxval. Submitted by: Ard Biesheuvel. (cherry picked from commit e8d93e34)
-
Andy Polyakov authored
(cherry picked from commit e2eabed1)
-
Andy Polyakov authored
Pointer out and suggested by: Ard Biesheuvel. (cherry picked from commit 5dcf70a1)
-
Andy Polyakov authored
(cherry picked from commit 72346328)
-
Andy Polyakov authored
(cherry picked from commit 797d24be)
-
Andy Polyakov authored
sha/asm/sha256-armv4.pl: add ARMv8 code path. (cherry picked from commit 9250a306)
-
Andy Polyakov authored
(cherry picked from commit 4afa9f03)
-
Hubert Kario authored
Backport of patch: add ECC strings to ciphers(1), point out difference between DH and ECDH and backport of other other assorted fixes to this man page * Make a clear distinction between DH and ECDH key exchange. * Group all key exchange cipher suite identifiers, first DH then ECDH * add descriptions for all supported *DH* identifiers * add ECDSA authentication descriptions * add example showing how to disable all suites that offer no authentication or encryption * update status of static DH (it's now supported) * backport descriptions of AES128, AES256, AESGCM * backport descriptions of CAMELLIA128, CAMELLIA256 * backport listing of standard names for ECC cipher suites and TLSv1.2 cipher suites * backport description of PSK cipher suites
-
Mike Bland authored
Defines SETUP_TEST_FIXTURE and EXECUTE_TEST, and updates ssl/heartbeat_test.c using these macros. SETUP_TEST_FIXTURE makes use of the new TEST_CASE_NAME macro, defined to use __func__ or __FUNCTION__ on platforms that support those symbols, or to use the file name and line number otherwise. This should fix several reported build problems related to lack of C99 support.
-
Dr. Stephen Henson authored
Remove experimental DANE/dnssec code: not ready for use in an official release yet.
-
Dr. Stephen Henson authored
PR#3394 (cherry picked from commit 7a9d59c1)
-
- Jun 09, 2014
-
-
Dr. Stephen Henson authored
SRP ciphersuites do not have no authentication. They have authentication based on SRP. Add new SRP authentication flag and cipher string. (cherry picked from commit a86b88acc373ac1fb0ca709a5fb8a8fa74683f67)
-
Dr. Stephen Henson authored
Fix strength_bits to 112 for 3DES. (cherry picked from commit 837c203719205ab19b5609b2df7151be8df05687)
-
- Jun 08, 2014
-
-
Kurt Roeckx authored
It's using an internal API that that might not be available in the shared library.
-
Jakub Wilk authored
Because of a missing include <fcntl.h> we don't have O_CREATE and don't create the file with open() using mode 0600 but fall back to using fopen() with the default umask followed by a chmod(). Problem found by Jakub Wilk <jwilk@debian.org>.
-
- Jun 07, 2014
-
-
Dr. Stephen Henson authored
If application uses tls_session_secret_cb for session resumption set the CCS_OK flag. (cherry picked from commit 953c592572e8811b7956cc09fbd8e98037068b58)
-
Dr. Stephen Henson authored
-
Matt Caswell authored
-
- Jun 05, 2014
-
-
Dr. Stephen Henson authored
A buffer overrun attack can be triggered by sending invalid DTLS fragments to an OpenSSL DTLS client or server. This is potentially exploitable to run arbitrary code on a vulnerable client or server. Fixed by adding consistency check for DTLS fragments. Thanks to Jüri Aedla for reporting this issue. (cherry picked from commit 1632ef74)
-
Dr. Stephen Henson authored
Only accept change cipher spec when it is expected instead of at any time. This prevents premature setting of session keys before the master secret is determined which an attacker could use as a MITM attack. Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for reporting this issue and providing the initial fix this patch is based on. (cherry picked from commit bc8923b1)
-
Dr. Stephen Henson authored
Return a fatal error if an attempt is made to use a zero length master secret. (cherry picked from commit 006cd708)
-
Dr. Stephen Henson authored
Unnecessary recursion when receiving a DTLS hello request can be used to crash a DTLS client. Fixed by handling DTLS hello request without recursion. Thanks to Imre Rad (Search-Lab Ltd.) for discovering this issue. (cherry picked from commit d3152655)
-
Dr. Stephen Henson authored
Check session_cert is not NULL before dereferencing it. (cherry picked from commit 8011cd56)
-
- Jun 03, 2014
-
-
Libor Krystek authored
-
- Jun 02, 2014
-
-
David Benjamin authored
(cherry picked from commit 7d89b3bf42e4b4067371ab33ef7631434e41d1e4)
-
zhu qun-ying authored
PR#3286 (cherry picked from commit 71e95000afb2227fe5cac1c79ae884338bcd8d0b)
-