summaryrefslogtreecommitdiffstats
path: root/ssl/t1_lib.c
AgeCommit message (Collapse)Author
2014-10-15Fix for session tickets memory leak.Dr. Stephen Henson
CVE-2014-3567 Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (cherry picked from commit 90e53055939db40cf0fac1ad0c59630280aeee86)
2014-06-29Fix memory leak.Dr. Stephen Henson
PR#2531. (cherry picked from commit 59899c4d1b4b6ee4066a540bad2b62cb22ac3d91)
2013-10-04Tidy up comments.Rob Stradling
2013-10-04Use TLS version supplied by client when fingerprinting Safari.Rob Stradling
2013-10-04Don't prefer ECDHE-ECDSA ciphers when the client appears to be Safari on OS X.Rob Stradling
OS X 10.8..10.8.3 has broken support for ECDHE-ECDSA ciphers.
2013-02-05Add and use a constant-time memcmp.Ben Laurie
This change adds CRYPTO_memcmp, which compares two vectors of bytes in an amount of time that's independent of their contents. It also changes several MAC compares in the code to use this over the standard memcmp, which may leak information about the size of a matching prefix. (cherry picked from commit 2ee798880a246d648ecddadc5b91367bee4a5d98) Conflicts: crypto/crypto.h ssl/t1_lib.c (cherry picked from commit dc406b59f3169fe191e58906df08dce97edb727c) Conflicts: crypto/crypto.h ssl/d1_pkt.c ssl/s3_pkt.c
2012-10-05backport OCSP fix enhancementDr. Stephen Henson
2012-10-05Backport OCSP fix.Ben Laurie
2012-01-04Submitted by: Adam Langley <agl@chromium.org>Dr. Stephen Henson
Reviewed by: steve Fix memory leaks.
2011-02-08OCSP stapling fix (OpenSSL 0.9.8r/1.0.0d)OpenSSL_0_9_8rBodo Möller
Submitted by: Neel Mehta, Adam Langley, Bodo Moeller
2010-11-16fix CVE-2010-3864Dr. Stephen Henson
2010-06-12Fix gcc 4.6 warnings. Check TLS server hello extension length.Ben Laurie
2010-02-17Allow renegotiation if SSL_OP_LEGACY_SERVER_CONNECT is set as well asDr. Stephen Henson
initial connection to unpatched servers. There are no additional security concerns in doing this as clients don't see renegotiation during an attack anyway.
2010-01-07Simplify RI+SCSV logic:Dr. Stephen Henson
1. Send SCSV is not renegotiating, never empty RI. 2. Send RI if renegotiating.
2009-12-17Alert to use is now defined in spec: update codeDr. Stephen Henson
2009-12-16New option to enable/disable connection to unpatched serversDr. Stephen Henson
2009-12-14add another missed caseDr. Stephen Henson
2009-12-14simplify RI error code and catch extra error case ignored beforeDr. Stephen Henson
2009-12-14Allow initial connection (but no renegoriation) to servers which don't supportDr. Stephen Henson
RI.
2009-12-08Add support for magic cipher suite value (MCSV). Make secure renegotiationDr. Stephen Henson
work in SSLv3: initial handshake has no extensions but includes MCSV, if server indicates RI support then renegotiation handshakes include RI. NB: current MCSV value is bogus for testing only, will be updated when we have an official value. Change mismatch alerts to handshake_failure as required by spec. Also have some debugging fprintfs so we can clearly see what is going on if OPENSSL_RI_DEBUG is set.
2009-11-18Include a more meaningful error message when rejecting legacy renegotiationDr. Stephen Henson
2009-11-09Fix wrong function codes and duplicate codesDr. Stephen Henson
2009-11-08First cut of renegotiation extension.Ben Laurie
2009-11-08Re-revert (re-insert?) temporary change that made renegotiation work againDr. Stephen Henson
and add a proper fix: specifically if it is a new session don't send the old TLS ticket, send a zero length ticket to request a new session.
2009-10-30Fix stateless session resumption so it can coexist with SNIDr. Stephen Henson
2009-09-04PR: 2028Dr. Stephen Henson
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Approved by: steve@openssl.org Fix DTLS cookie management bugs.
2009-04-28Update from 1.0.0-stable.Dr. Stephen Henson
2008-09-03If tickets disabled behave as if no ticket received to supportDr. Stephen Henson
stateful resume.
2008-05-28Fix double-free in TLS server name extensions which could lead to a remoteMark J. Cox
crash found by Codenomicon TLS test suite (CVE-2008-0891) Reviewed by: openssl-security@openssl.org Obtained from: jorton@redhat.com
2008-04-30TLS ticket key setting callback: this allows and application to setDr. Stephen Henson
its own TLS ticket keys.
2007-10-18Ensure the ticket expected flag is reset when a stateless resumption isDr. Stephen Henson
successful.
2007-10-12Backport certificate status request TLS extension support to 0.9.8.Dr. Stephen Henson
2007-09-21More changes from HEAD:Bodo Möller
- no need to disable SSL 2.0 for SSL_CTRL_SET_TLSEXT_HOSTNAME now that ssl23_client_hello takes care of that - fix buffer overrun checks in ssl_add_serverhello_tlsext()
2007-09-21Fixes from HEAD.Dr. Stephen Henson
2007-08-20Update from HEAD.Dr. Stephen Henson
2007-08-12Backport of TLS extension code to OpenSSL 0.9.8.Dr. Stephen Henson
Include server name and RFC4507bis support. This is not compiled in by default and must be explicitly enabled with the Configure option enable-tlsext
2007-01-21Update from HEAD.Dr. Stephen Henson
2005-08-05Initialize SSL_METHOD structures at compile time. This removes the needDr. Stephen Henson
for locking code. The CRYPTO_LOCK_SSL_METHOD lock is now no longer used.
2005-04-26Add DTLS support.Ben Laurie
2005-03-31Give everything prototypes (well, everything that's actually used).Ben Laurie
2000-02-20Move the registration of callback functions to special functionsRichard Levitte
designed for that. This removes the potential error to mix data and function pointers. Please note that I'm a little unsure how incorrect calls to the old ctrl functions should be handled, in som cases. I currently return 0 and that's it, but it may be more correct to generate a genuine error in those cases.
2000-01-30Source code cleanups: Use void * rather than char * in lhash,Ulf Möller
eliminate some of the -Wcast-qual warnings (debug-ben-strict target)
1999-09-29Cosmetic changes.Ulf Möller
1999-04-23Change #include filenames from <foo.h> to <openssl.h>.Bodo Möller
Submitted by: Reviewed by: PR:
1999-04-19Change functions to ANSI C.Ulf Möller
1999-03-22Fix security hole.Ben Laurie
1998-12-31Fix version stuff:Ralf S. Engelschall
1. The already released version was 0.9.1c and not 0.9.1b 2. The next release should be 0.9.2 and not 0.9.1d, because first the changes are already too large, second we should avoid any more 0.9.1x confusions and third, the Apache version semantics of VERSION.REVISION.PATCHLEVEL for the version string is reasonable (and here .2 is already just a patchlevel and not major change). tVS: ----------------------------------------------------------------------
1998-12-23*** empty log message ***OpenSSL_0_9_1cRalf S. Engelschall
1998-12-23Switch version string to SSLeay/OpenSSLRalf S. Engelschall
1998-12-22Various cleanups and fixed by Marc and Ralf to start the OpenTLS projectRalf S. Engelschall