summaryrefslogtreecommitdiffstats
path: root/crypto/openssl/ssl/d1_pkt.c
Commit message (Collapse)AuthorAgeFilesLines
* Backport OpenSSL commit af58be768ebb690f78530f796e92b8ae5c9a4401:delphij2016-11-021-0/+15
| | | | | | | | | | | | | | Don't allow too many consecutive warning alerts Certain warning alerts are ignored if they are received. This can mean that no progress will be made if one peer continually sends those warning alerts. Implement a count so that we abort the connection if we receive too many. Issue reported by Shi Lei. This is a direct commit to stable/10 and stable/9. Security: CVE-2016-8610
* Merge OpenSSL 1.0.1u.jkim2016-09-221-15/+77
|
* MFC: r284283jkim2015-06-111-1/+1
| | | | Merge OpenSSL 1.0.1n.
* MFC: r280297jkim2015-03-201-1603/+1596
| | | | | | Merge OpenSSL 1.0.1m. Relnotes: yes
* MFC: r276861, r276863jkim2015-01-091-13/+24
| | | | Merge OpenSSL 1.0.1k.
* MFC: r267256jkim2014-06-091-9/+10
| | | | | | Merge OpenSSL 1.0.1h. Approved by: so (delphij)
* MFC: r261037, r264278jkim2014-04-101-0/+7
| | | | Merge OpenSSL 1.0.1f and 1.0.1g.
* Merge OpenSSL 1.0.1e.jkim2013-02-131-37/+54
|\ | | | | | | Approved by: secteam (simon), benl (silence)
* \ Merge OpenSSL 1.0.1c.jkim2012-07-121-191/+252
|\ \ | |/ | | | | Approved by: benl (maintainer)
* | Merge OpenSSL 0.9.8x.jkim2012-06-271-29/+29
| | | | | | | | | | | | Reviewed by: stas Approved by: benl (maintainer) MFC after: 3 days
* | Merge OpenSSL 0.9.8p into head.simon2010-11-221-33/+27
| | | | | | | | | | Security: CVE-2010-3864 Security: http://www.openssl.org/news/secadv_20101116.txt
* | Merge OpenSSL 0.9.8m into head.simon2010-03-131-100/+125
|\ \ | |/ | | | | | | | | | | | | | | | | | | This also "reverts" some FreeBSD local changes so we should now be back to using entirely stock OpenSSL. The local changes were simple $FreeBSD$ lines additions, which were required in the CVS days, and the patch for FreeBSD-SA-09:15.ssl which has been superseded with OpenSSL 0.9.8m's RFC5746 'TLS renegotiation extension' support. MFC after: 3 weeks
* | Merge DTLS fixes from vendor-crypto/openssl/dist:simon2009-08-231-0/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | - Fix memory consumption bug with "future epoch" DTLS records. - Fix fragment handling memory leak. - Do not access freed data structure. - Fix DTLS fragment bug - out-of-sequence message handling which could result in NULL pointer dereference in dtls1_process_out_of_seq_message(). Note that this will not get FreeBSD Security Advisory as DTLS is experimental in OpenSSL. MFC after: 1 week Security: CVE-2009-1377 CVE-2009-1378 CVE-2009-1379 CVE-2009-1387
* | Merge OpenSSL 0.9.8k into head.simon2009-06-141-49/+69
|\ \ | |/ | | | | Approved by: re
| * Flatten OpenSSL vendor tree.simon2008-08-231-1772/+0
|/
* Vendor import of OpenSSL 0.9.8e.simon2007-03-151-5/+1
|
* Vendor import of OpenSSL 0.9.8d.simon2006-10-011-2/+8
|
* Vendor import of OpenSSL 0.9.8bsimon2006-07-291-0/+1770
OpenPOWER on IntegriCloud