aboutsummaryrefslogtreecommitdiffstats
path: root/crypto/openssl/ssl/ssl.h
diff options
context:
space:
mode:
authorSimon L. B. Nielsen <simon@FreeBSD.org>2007-10-18 20:19:33 +0000
committerSimon L. B. Nielsen <simon@FreeBSD.org>2007-10-18 20:19:33 +0000
commita0ddfe4e7233d81e88a86217b7653708db2720fa (patch)
tree18668034f47decf1b245c279a6825a76c0eb0425 /crypto/openssl/ssl/ssl.h
parentc30e4c61747efa38a51b4f5848b597da341fd0cd (diff)
downloadsrc-a0ddfe4e7233d81e88a86217b7653708db2720fa.tar.gz
src-a0ddfe4e7233d81e88a86217b7653708db2720fa.zip
Import DTLS security fix from upstream OpenSSL_0_9_8-stable branch.
From the OpenSSL advisory: Andy Polyakov discovered a flaw in OpenSSL's DTLS implementation which could lead to the compromise of clients and servers with DTLS enabled. DTLS is a datagram variant of TLS specified in RFC 4347 first supported in OpenSSL version 0.9.8. Note that the vulnerabilities do not affect SSL and TLS so only clients and servers explicitly using DTLS are affected. We believe this flaw will permit remote code execution. Security: CVE-2007-4995 Security: http://www.openssl.org/news/secadv_20071012.txt
Notes
Notes: svn path=/vendor-crypto/openssl/dist/; revision=172767
Diffstat (limited to 'crypto/openssl/ssl/ssl.h')
-rw-r--r--crypto/openssl/ssl/ssl.h1
1 files changed, 1 insertions, 0 deletions
diff --git a/crypto/openssl/ssl/ssl.h b/crypto/openssl/ssl/ssl.h
index 2e067e7a78e4..85f72e0ae986 100644
--- a/crypto/openssl/ssl/ssl.h
+++ b/crypto/openssl/ssl/ssl.h
@@ -1564,6 +1564,7 @@ void ERR_load_SSL_strings(void);
#define SSL_F_DTLS1_GET_MESSAGE_FRAGMENT 253
#define SSL_F_DTLS1_GET_RECORD 254
#define SSL_F_DTLS1_OUTPUT_CERT_CHAIN 255
+#define SSL_F_DTLS1_PREPROCESS_FRAGMENT 277
#define SSL_F_DTLS1_PROCESS_OUT_OF_SEQ_MESSAGE 256
#define SSL_F_DTLS1_PROCESS_RECORD 257
#define SSL_F_DTLS1_READ_BYTES 258