summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/rc2
diff options
context:
space:
mode:
authortb <>2020-05-19 20:22:33 +0000
committertb <>2020-05-19 20:22:33 +0000
commit7b3159529b31e90658d16fd8468765e7ae37f1e5 (patch)
tree70bd00aac210ae3d3f3e3ab72981b3a2c8d8aaa2 /src/lib/libcrypto/rc2
parent8aebf2fb10f113302177f540df5817423bbd2cce (diff)
downloadopenbsd-libressl-v3.1.2.tar.gz
openbsd-libressl-v3.1.2.tar.bz2
openbsd-libressl-v3.1.2.zip
OpenBSD 6.7 errata 004 6.7/004_libssl.patch.siglibressl-v3.1.2
original commits: CVSROOT: /cvs Module name: src Changes by: jsing@cvs.openbsd.org 2020/05/16 08:44:55 Modified files: lib/libssl : tls13_client.c Log message: Ensure that a TLSv1.3 server has provided a certificate. The RFC requires that a server always provide a certificate for authentication. Ensure that this is the case, rather than proceeding and attempting validation. In the case where validation was disabled and the server returned an empty certificate list, this would have previously resulted in a NULL pointer deference. Issue reported by otto@ ok inoguchi@ tb@ CVSROOT: /cvs Module name: src Changes by: jsing@cvs.openbsd.org 2020/05/17 08:26:15 Modified files: lib/libssl : tls13_client.c Log message: Send a decode error alert if a server provides an empty certificate list. According to RFC 8446 section 4.4.2.4, a client receiving an empty certificate list must abort the handshake with a decode error alert. ok beck@ inoguchi@ tb@ ('it rarely is the alert you'd expect it to be...')
Diffstat (limited to 'src/lib/libcrypto/rc2')
0 files changed, 0 insertions, 0 deletions