summaryrefslogtreecommitdiffstats
path: root/crypto/openssl/ssl/d1_both.c
Commit message (Collapse)AuthorAgeFilesLines
* MFC: r318899jkim2017-11-131-4/+17
| | | | | | Merge OpenSSL 1.0.2l. (cherry picked from commit ffd1bb8c599181e0733f8e00d8d8198b4ea6a73b)
* MFC: r306193jkim2016-09-221-21/+26
| | | | Merge OpenSSL 1.0.2u.
* Merge OpenSSL 1.0.2h.jkim2016-05-031-0/+2
|\ | | | | | | Relnotes: yes
* \ Merge OpenSSL 1.0.2f.jkim2016-01-281-21/+49
|\ \ | |/ | | | | Relnotes: yes
* | Merge OpenSSL 1.0.2e.jkim2015-12-031-2/+5
|\ \ | |/
* | Merge OpenSSL 1.0.2d.jkim2015-10-301-131/+11
|\ \ | |/
* | Merge OpenSSL 1.0.1n.jkim2015-06-111-12/+34
| |
* | Merge OpenSSL 1.0.1m.jkim2015-03-201-1436/+1419
|\ \ | |/
* | Merge OpenSSL 1.0.1k.jkim2015-01-081-68/+94
|\ \ | |/
* | Merge OpenSSL 1.0.1j.jkim2014-10-151-0/+3
|\ \ | |/
* | Merge OpenSSL 1.0.1i.jkim2014-08-071-33/+49
|\ \ | |/
* | Merge OpenSSL 1.0.1h.jkim2014-06-091-1/+1
|\ \ | |/ | | | | Approved by: so (delphij)
* | Fix OpenSSL multiple vulnerabilities.delphij2014-06-051-2/+11
| | | | | | | | | | | | | | Security: CVE-2014-0195, CVE-2014-0221, CVE-2014-0224, CVE-2014-3470 Security: SA-14:14.openssl Approved by: so
* | Fix NFS deadlock vulnerability. [SA-14:05]delphij2014-04-081-8/+18
| | | | | | | | | | Fix "Heartbleed" vulnerability and ECDSA Cache Side-channel Attack in OpenSSL. [SA-14:06]
* | Merge OpenSSL 1.0.1f.jkim2014-01-221-3/+4
| | | | | | | | Approved by: so (delphij), benl (silence)
* | MFV r260399:delphij2014-01-071-0/+6
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Apply vendor commits: 197e0ea Fix for TLS record tampering bug. (CVE-2013-4353). 3462896 For DTLS we might need to retransmit messages from the previous session so keep a copy of write context in DTLS retransmission buffers instead of replacing it after sending CCS. (CVE-2013-6450). ca98926 When deciding whether to use TLS 1.2 PRF and record hash algorithms use the version number in the corresponding SSL_METHOD structure instead of the SSL structure. The SSL structure version is sometimes inaccurate. Note: OpenSSL 1.0.2 and later effectively do this already. (CVE-2013-6449). Security: CVE-2013-4353 Security: CVE-2013-6449 Security: CVE-2013-6450
* | Merge OpenSSL 1.0.1c.jkim2012-07-121-59/+227
|\ \ | |/ | | | | Approved by: benl (maintainer)
* | Merge OpenSSL 0.9.8x.jkim2012-06-271-27/+28
| | | | | | | | | | | | Reviewed by: stas Approved by: benl (maintainer) MFC after: 3 days
* | Merge OpenSSL 0.9.8p into head.simon2010-11-221-84/+236
| | | | | | | | | | Security: CVE-2010-3864 Security: http://www.openssl.org/news/secadv_20101116.txt
* | Merge OpenSSL 0.9.8m into head.simon2010-03-131-88/+154
|\ \ | |/ | | | | | | | | | | | | | | | | | | This also "reverts" some FreeBSD local changes so we should now be back to using entirely stock OpenSSL. The local changes were simple $FreeBSD$ lines additions, which were required in the CVS days, and the patch for FreeBSD-SA-09:15.ssl which has been superseded with OpenSSL 0.9.8m's RFC5746 'TLS renegotiation extension' support. MFC after: 3 weeks
* | Merge DTLS fixes from vendor-crypto/openssl/dist:simon2009-08-231-17/+28
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | - Fix memory consumption bug with "future epoch" DTLS records. - Fix fragment handling memory leak. - Do not access freed data structure. - Fix DTLS fragment bug - out-of-sequence message handling which could result in NULL pointer dereference in dtls1_process_out_of_seq_message(). Note that this will not get FreeBSD Security Advisory as DTLS is experimental in OpenSSL. MFC after: 1 week Security: CVE-2009-1377 CVE-2009-1378 CVE-2009-1379 CVE-2009-1387
* | Merge OpenSSL 0.9.8k into head.simon2009-06-141-10/+12
|\ \ | |/ | | | | Approved by: re
| * Flatten OpenSSL vendor tree.simon2008-08-231-1191/+0
|/
* Import DTLS security fix from upstream OpenSSL_0_9_8-stable branch.simon2007-10-181-611/+539
| | | | | | | | | | | | | | | | | | From the OpenSSL advisory: Andy Polyakov discovered a flaw in OpenSSL's DTLS implementation which could lead to the compromise of clients and servers with DTLS enabled. DTLS is a datagram variant of TLS specified in RFC 4347 first supported in OpenSSL version 0.9.8. Note that the vulnerabilities do not affect SSL and TLS so only clients and servers explicitly using DTLS are affected. We believe this flaw will permit remote code execution. Security: CVE-2007-4995 Security: http://www.openssl.org/news/secadv_20071012.txt
* Vendor import of OpenSSL 0.9.8bsimon2006-07-291-0/+1263
OpenPOWER on IntegriCloud