summaryrefslogtreecommitdiff
path: root/src/lib/libssl/s3_pkt.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* This commit was manufactured by cvs2git to create tag 'OPENBSD_5_5_BASE'.OPENBSD_5_5_BASEcvs2svn2014-02-271-1528/+0
|
* SECURITY fixes backported from openssl-1.0.1f. ok mikeb@jca2014-02-271-1/+7
| | | | | | | | | | | | CVE-2013-4353 NULL pointer dereference with crafted Next Protocol Negotiation record in TLS handshake. Upstream: 197e0ea CVE-2013-6449 Fix crash with crafted traffic from a TLS 1.2 client. Upstream: ca98926, 0294b2b CVE-2013-6450 Fix DTLS retransmission from previous session. Upstream: 3462896
* cherry pick bugfixes for http://www.openssl.org/news/secadv_20130205.txtmarkus2013-02-141-47/+51
| | | | | from the openssl git (changes between openssl 1.0.1c and 1.0.1d). ok djm@
* resolve conflictsdjm2012-10-131-9/+68
|
* openssl-1.0.0e: resolve conflictsdjm2011-11-031-2/+4
|
* resolve conflicts, fix local changesdjm2010-10-011-77/+206
|
* Security fix for CVE-2010-0740jasper2010-04-141-3/+4
| | | | | | | | | "In TLS connections, certain incorrectly formatted records can cause an OpenSSL client or server to crash due to a read attempt at NULL." http://openssl.org/news/secadv_20100324.txt ok deraadt@ djm@ sthen@
* pull Ben Lauries blind prefix injection fix for CVE-2009-3555 frommarkus2009-11-101-1/+3
| | | | openssl 0.9.8l; crank minor version; ok djm@ deraadt@; initially from jsg@
* resolve conflictsdjm2009-01-091-1/+8
|
* update to openssl-0.9.8i; tested by several, especially krw@djm2009-01-051-0/+7
|
* resolve conflictsdjm2008-09-061-24/+25
|
* resolve conflictsdjm2005-04-291-6/+6
|
* avoid null-pointer deref (aka CAN-2004-0079)markus2004-03-171-0/+8
| | | | see http://www.openssl.org/news/secadv_20040317.txt
* security fix from openssl 0.9.7a:markus2003-02-191-16/+31
| | | | | | | | In ssl3_get_record (ssl/s3_pkt.c), minimize information leaked via timing by performing a MAC computation even if incorrrect block cipher padding has been found. This is a countermeasure against active attacks where the attacker has to distinguish between bad padding and a MAC verification error. (CAN-2003-0078)
* merge openssl-0.9.7-beta3, tested on vax by miod@markus2002-09-101-1/+1
|
* OpenSSL 0.9.7 stable 2002 05 08 mergebeck2002-05-151-49/+132
|
* openssl-engine-0.9.6a mergebeck2001-06-221-9/+15
|
* openssl-engine-0.9.6 mergebeck2000-12-151-25/+29
|
* OpenSSL 0.9.5 mergebeck2000-03-191-304/+457
| | | | | | *warning* this bumps shared lib minors for libssl and libcrypto from 2.1 to 2.2 if you are using the ssl26 packages for ssh and other things to work you will need to get new ones (see ~beck/libsslsnap/<arch>) on cvs or ~beck/src-patent.tar.gz on cvs
* OpenSSL 0.9.4 mergebeck1999-09-291-90/+70
|
* Import of SSLeay-0.9.0b with RSA and IDEA stubbed + OpenBSD buildryker1998-10-051-0/+1061
functionality for shared libs. Note that routines such as sslv2_init and friends that use RSA will not work due to lack of RSA in this library. Needs documentation and help from ports for easy upgrade to full functionality where legally possible.