- May 11, 2012
-
-
Dr. Stephen Henson authored
Reported by: Constantine Sapuntzakis <csapuntz@gmail.com> Fix possible deadlock when decoding public keys.
-
Dr. Stephen Henson authored
Reported by: Phil Pennock <openssl-dev@spodhuis.org> Make renegotiation work for TLS 1.2, 1.1 by not using a lower record version client hello workaround if renegotiating.
-
- May 10, 2012
-
-
Dr. Stephen Henson authored
Submitted by: PK <runningdoglackey@yahoo.com> Correct ciphersuite signature algorithm definitions.
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
DTLS to fix DoS attack. Thanks to Codenomicon for discovering this issue using Fuzz-o-Matic fuzzing as a service testing platform. (CVE-2012-2333)
-
Richard Levitte authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
Make sure tkeylen is initialised properly when encrypting CMS messages.
-
- May 04, 2012
-
-
Richard Levitte authored
-
- Apr 27, 2012
-
-
Andy Polyakov authored
of digest algorithms, mosty SHA, on Power7. Mystery of century, why SHA, why slower algorithm are affected more... [from HEAD]. PR: 2794 Submitted by: Ashley Lai
-
- Apr 26, 2012
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
- Apr 25, 2012
-
-
Dr. Stephen Henson authored
OpenSSL 1.0.0. Add CHANGES entry noting the consequences.
-
Andy Polyakov authored
vector contiguous [from HEAD]. PR: 2802
-
- Apr 22, 2012
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
- Apr 20, 2012
-
-
Andy Polyakov authored
PR: 2797, 2792
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
- Apr 19, 2012
-
-
Andy Polyakov authored
[from HEAD]. PR: 2792
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
BUF_mem_grow and BUF_mem_grow_clean. Refuse attempts to shrink buffer in CRYPTO_realloc_clean. Thanks to Tavis Ormandy, Google Security Team, for discovering this issue and to Adam Langley <agl@chromium.org> for fixing it. (CVE-2012-2110)
-
Andy Polyakov authored
PR: 2793
-
- Apr 18, 2012
-
-
Dr. Stephen Henson authored
-
Andy Polyakov authored
PR: 2792
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
- Apr 17, 2012
-
-
Bodo Möller authored
(TLS 1.2 clients could end up negotiating these with an OpenSSL server with TLS 1.2 disabled, which is problematic.) Submitted by: Adam Langley
-
Dr. Stephen Henson authored
If OPENSSL_MAX_TLS1_2_CIPHER_LENGTH is set then limit the size of client ciphersuites to this value. A value of 50 should be sufficient. Document workarounds in CHANGES.
-
Dr. Stephen Henson authored
Some servers hang when presented with a client hello record length exceeding 255 bytes but will work with longer client hellos if the TLS record version in client hello does not exceed TLS v1.0. Unfortunately this doesn't fix all cases...
-