Skip to content
  1. Oct 29, 1999
  2. Oct 27, 1999
    • Dr. Stephen Henson's avatar
      Continued multibyte character support. · 74400f73
      Dr. Stephen Henson authored
      Add a bunch of functions to simplify the creation of X509_NAME structures.
      
      Change the X509_NAME_entry_add stuff in req/ca so it no longer uses
      X509_NAME_entry_count(): passing -1 has the same effect.
      74400f73
  3. Oct 26, 1999
  4. Oct 21, 1999
  5. Oct 20, 1999
  6. Oct 13, 1999
  7. Oct 11, 1999
  8. Oct 09, 1999
  9. Oct 07, 1999
  10. Oct 05, 1999
  11. Oct 04, 1999
  12. Oct 02, 1999
  13. Sep 24, 1999
  14. Sep 21, 1999
  15. Sep 20, 1999
  16. Sep 18, 1999
  17. Sep 10, 1999
  18. Sep 08, 1999
    • Bodo Möller's avatar
    • Dr. Stephen Henson's avatar
      This is preliminary support for an "RSA null" cipher. Unfortunately when · 4a61a64f
      Dr. Stephen Henson authored
      OpenSSL is compiled with NO_RSA, no RSA operations can be used: including
      key generation storage and display of RSA keys. Since these operations are
      not covered by the RSA patent (my understanding is it only covers encrypt,
      decrypt, sign and verify) they can be included: this is an often requested
      feature, attempts to use the patented operations return an error code.
      
      This is enabled by setting RSA_NULL. This means that if a particular application
      has its own legal US RSA implementation then it can use that instead by setting
      it as the default RSA method.
      
      Still experimental and needs some fiddling of the other libraries so they have
      some options that don't attempt to use RSA if it isn't allowed.
      4a61a64f
  19. Sep 07, 1999
  20. Sep 04, 1999
  21. Sep 03, 1999
  22. Aug 28, 1999
  23. Aug 27, 1999
  24. Aug 25, 1999
  25. Aug 24, 1999
  26. Aug 23, 1999
  27. Aug 22, 1999
  28. Aug 19, 1999
  29. Aug 18, 1999
    • Bodo Möller's avatar
      Fix horrible (and hard to track down) bug in ssl23_get_client_hello: · de1915e4
      Bodo Möller authored
      In case of a restart, v[0] and v[1] were incorrectly initialised.
      This was interpreted by ssl3_get_client_key_exchange as an RSA decryption
      failure (don't ask me why) and caused it to create a _random_ master key
      instead (even weirder), which obviously led to incorrect input to
      ssl3_generate_master_secret and thus caused "block cipher pad is
      wrong" error messages from ssl3_enc for the client's Finished message.
      Arrgh.
      de1915e4