path: root/patches/openssl-0.9.8g-tls-extensions.patch
Commit message (Collapse)AuthorAgeFilesLines
* Update OpenSSL 0.9.8 patch for EAP-FAST supportJouni Malinen2014-06-051-330/+0
| | | | | | | | | | | | | | The 0.9.9 branch was for development purposes only, so no one should be using that in production and there is not much point in maintaining the obsolete patch here either. Similarly, the old 0.9.8 versions are obsolete at this point in time and taken into account the recent OpenSSL vulnerabilities, anything older than 0.9.8za should not really be used. Prepare an updated version of the TLS session ticket patch based on the current OpenSSL 0.9.8za release and remove all the older TLS extension patches. Signed-off-by: Jouni Malinen <j@w1.fi>
* Fixed fallback to full handshake when server rejects PAC-OpaqueJouni Malinen2008-04-151-36/+20
| | | | | | | | | | The TLS client changes in ssl3_get_server_hello() were based on the pre-RFC 5077 version of OpenSSL and they hardcoded s->hit to 1 in case PAC-Opaque was used. This prevented fallback to full TLS handshake in case the server rejected PAC-Opaque in ClientHello. The fixed version simplifies ssl3_get_server_hello() and uses the new RFC 5077 functionality in OpenSSL (ssl3_check_finished) to allow the state machine handle start of abbreviated handshake based on the used ticket.
* Re-initialize hostapd/wpa_supplicant git repository based on 0.6.3 releaseJouni Malinen2008-02-281-0/+346