Age | Commit message (Collapse) | Author | |
---|---|---|---|
2014-10-15 | Fix for session tickets memory leak. | Dr. Stephen Henson | |
CVE-2014-3567 Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (cherry picked from commit 90e53055939db40cf0fac1ad0c59630280aeee86) | |||
2014-06-29 | Fix memory leak. | Dr. Stephen Henson | |
PR#2531. (cherry picked from commit 59899c4d1b4b6ee4066a540bad2b62cb22ac3d91) | |||
2013-10-04 | Tidy up comments. | Rob Stradling | |
2013-10-04 | Use TLS version supplied by client when fingerprinting Safari. | Rob Stradling | |
2013-10-04 | Don't prefer ECDHE-ECDSA ciphers when the client appears to be Safari on OS X. | Rob Stradling | |
OS X 10.8..10.8.3 has broken support for ECDHE-ECDSA ciphers. | |||
2013-02-05 | Add and use a constant-time memcmp. | Ben Laurie | |
This change adds CRYPTO_memcmp, which compares two vectors of bytes in an amount of time that's independent of their contents. It also changes several MAC compares in the code to use this over the standard memcmp, which may leak information about the size of a matching prefix. (cherry picked from commit 2ee798880a246d648ecddadc5b91367bee4a5d98) Conflicts: crypto/crypto.h ssl/t1_lib.c (cherry picked from commit dc406b59f3169fe191e58906df08dce97edb727c) Conflicts: crypto/crypto.h ssl/d1_pkt.c ssl/s3_pkt.c | |||
2012-10-05 | backport OCSP fix enhancement | Dr. Stephen Henson | |
2012-10-05 | Backport OCSP fix. | Ben Laurie | |
2012-01-04 | Submitted by: Adam Langley <agl@chromium.org> | Dr. Stephen Henson | |
Reviewed by: steve Fix memory leaks. | |||
2011-02-08 | OCSP stapling fix (OpenSSL 0.9.8r/1.0.0d)OpenSSL_0_9_8r | Bodo Möller | |
Submitted by: Neel Mehta, Adam Langley, Bodo Moeller | |||
2010-11-16 | fix CVE-2010-3864 | Dr. Stephen Henson | |
2010-06-12 | Fix gcc 4.6 warnings. Check TLS server hello extension length. | Ben Laurie | |
2010-02-17 | Allow renegotiation if SSL_OP_LEGACY_SERVER_CONNECT is set as well as | Dr. Stephen Henson | |
initial connection to unpatched servers. There are no additional security concerns in doing this as clients don't see renegotiation during an attack anyway. | |||
2010-01-07 | Simplify RI+SCSV logic: | Dr. Stephen Henson | |
1. Send SCSV is not renegotiating, never empty RI. 2. Send RI if renegotiating. | |||
2009-12-17 | Alert to use is now defined in spec: update code | Dr. Stephen Henson | |
2009-12-16 | New option to enable/disable connection to unpatched servers | Dr. Stephen Henson | |
2009-12-14 | add another missed case | Dr. Stephen Henson | |
2009-12-14 | simplify RI error code and catch extra error case ignored before | Dr. Stephen Henson | |
2009-12-14 | Allow initial connection (but no renegoriation) to servers which don't support | Dr. Stephen Henson | |
RI. | |||
2009-12-08 | Add support for magic cipher suite value (MCSV). Make secure renegotiation | Dr. Stephen Henson | |
work in SSLv3: initial handshake has no extensions but includes MCSV, if server indicates RI support then renegotiation handshakes include RI. NB: current MCSV value is bogus for testing only, will be updated when we have an official value. Change mismatch alerts to handshake_failure as required by spec. Also have some debugging fprintfs so we can clearly see what is going on if OPENSSL_RI_DEBUG is set. | |||
2009-11-18 | Include a more meaningful error message when rejecting legacy renegotiation | Dr. Stephen Henson | |
2009-11-09 | Fix wrong function codes and duplicate codes | Dr. Stephen Henson | |
2009-11-08 | First cut of renegotiation extension. | Ben Laurie | |
2009-11-08 | Re-revert (re-insert?) temporary change that made renegotiation work again | Dr. Stephen Henson | |
and add a proper fix: specifically if it is a new session don't send the old TLS ticket, send a zero length ticket to request a new session. | |||
2009-10-30 | Fix stateless session resumption so it can coexist with SNI | Dr. Stephen Henson | |
2009-09-04 | PR: 2028 | Dr. Stephen Henson | |
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Approved by: steve@openssl.org Fix DTLS cookie management bugs. | |||
2009-04-28 | Update from 1.0.0-stable. | Dr. Stephen Henson | |
2008-09-03 | If tickets disabled behave as if no ticket received to support | Dr. Stephen Henson | |
stateful resume. | |||
2008-05-28 | Fix double-free in TLS server name extensions which could lead to a remote | Mark J. Cox | |
crash found by Codenomicon TLS test suite (CVE-2008-0891) Reviewed by: openssl-security@openssl.org Obtained from: jorton@redhat.com | |||
2008-04-30 | TLS ticket key setting callback: this allows and application to set | Dr. Stephen Henson | |
its own TLS ticket keys. | |||
2007-10-18 | Ensure the ticket expected flag is reset when a stateless resumption is | Dr. Stephen Henson | |
successful. | |||
2007-10-12 | Backport certificate status request TLS extension support to 0.9.8. | Dr. Stephen Henson | |
2007-09-21 | More changes from HEAD: | Bodo Möller | |
- no need to disable SSL 2.0 for SSL_CTRL_SET_TLSEXT_HOSTNAME now that ssl23_client_hello takes care of that - fix buffer overrun checks in ssl_add_serverhello_tlsext() | |||
2007-09-21 | Fixes from HEAD. | Dr. Stephen Henson | |
2007-08-20 | Update from HEAD. | Dr. Stephen Henson | |
2007-08-12 | Backport of TLS extension code to OpenSSL 0.9.8. | Dr. Stephen Henson | |
Include server name and RFC4507bis support. This is not compiled in by default and must be explicitly enabled with the Configure option enable-tlsext | |||
2007-01-21 | Update from HEAD. | Dr. Stephen Henson | |
2005-08-05 | Initialize SSL_METHOD structures at compile time. This removes the need | Dr. Stephen Henson | |
for locking code. The CRYPTO_LOCK_SSL_METHOD lock is now no longer used. | |||
2005-04-26 | Add DTLS support. | Ben Laurie | |
2005-03-31 | Give everything prototypes (well, everything that's actually used). | Ben Laurie | |
2000-02-20 | Move the registration of callback functions to special functions | Richard Levitte | |
designed for that. This removes the potential error to mix data and function pointers. Please note that I'm a little unsure how incorrect calls to the old ctrl functions should be handled, in som cases. I currently return 0 and that's it, but it may be more correct to generate a genuine error in those cases. | |||
2000-01-30 | Source code cleanups: Use void * rather than char * in lhash, | Ulf Möller | |
eliminate some of the -Wcast-qual warnings (debug-ben-strict target) | |||
1999-09-29 | Cosmetic changes. | Ulf Möller | |
1999-04-23 | Change #include filenames from <foo.h> to <openssl.h>. | Bodo Möller | |
Submitted by: Reviewed by: PR: | |||
1999-04-19 | Change functions to ANSI C. | Ulf Möller | |
1999-03-22 | Fix security hole. | Ben Laurie | |
1998-12-31 | Fix version stuff: | Ralf S. Engelschall | |
1. The already released version was 0.9.1c and not 0.9.1b 2. The next release should be 0.9.2 and not 0.9.1d, because first the changes are already too large, second we should avoid any more 0.9.1x confusions and third, the Apache version semantics of VERSION.REVISION.PATCHLEVEL for the version string is reasonable (and here .2 is already just a patchlevel and not major change). tVS: ---------------------------------------------------------------------- | |||
1998-12-23 | *** empty log message ***OpenSSL_0_9_1c | Ralf S. Engelschall | |
1998-12-23 | Switch version string to SSLeay/OpenSSL | Ralf S. Engelschall | |
1998-12-22 | Various cleanups and fixed by Marc and Ralf to start the OpenTLS project | Ralf S. Engelschall | |