1. 05 12月, 2015 1 次提交
  2. 30 11月, 2015 1 次提交
  3. 28 11月, 2015 1 次提交
  4. 25 11月, 2015 2 次提交
  5. 24 11月, 2015 1 次提交
  6. 21 11月, 2015 1 次提交
  7. 20 11月, 2015 1 次提交
  8. 10 11月, 2015 1 次提交
  9. 06 11月, 2015 2 次提交
  10. 30 10月, 2015 18 次提交
  11. 24 10月, 2015 1 次提交
  12. 15 10月, 2015 1 次提交
  13. 09 10月, 2015 1 次提交
  14. 07 10月, 2015 1 次提交
  15. 06 10月, 2015 3 次提交
  16. 23 9月, 2015 1 次提交
  17. 18 9月, 2015 1 次提交
  18. 17 9月, 2015 1 次提交
    • E
      Disentangle RSA premaster secret parsing · 20ca916d
      Emilia Kasper 提交于
      Simplify encrypted premaster secret reading by using new methods in the
      PACKET API.
      
      Don't overwrite the packet buffer. RSA decrypt accepts truncated
      ciphertext with leading zeroes omitted, so it's even possible that by
      crafting a valid ciphertext with several leading zeroes, this could
      cause a few bytes out-of-bounds write. The write is harmless because of
      the size of the underlying message buffer, but nevertheless we shouldn't
      write into the packet.
      Reviewed-by: NMatt Caswell <matt@openssl.org>
      20ca916d
  19. 15 9月, 2015 1 次提交
    • D
      Fix PSK identity hint handling. · df6da24b
      Dr. Stephen Henson 提交于
      For server use a PSK identity hint value in the CERT structure which
      is inherited when SSL_new is called and which allows applications to
      set hints on a per-SSL basis. The previous version of
      SSL_use_psk_identity_hint tried (wrongly) to use the SSL_SESSION structure.
      
      PR#4039
      Reviewed-by: NMatt Caswell <matt@openssl.org>
      df6da24b