- Mar 07, 2014
-
-
Dr. Stephen Henson authored
(cherry picked from commit 7a3e67f029969620966b8a627b8485d83692cca5)
-
Andy Polyakov authored
PR: 3275
-
Andy Polyakov authored
The problem is that OpenSSH calls EVP_Cipher, which is not as protective as EVP_CipherUpdate. Formally speaking we ought to do more checks in *_cipher methods, including rejecting lengths not divisible by block size (unless ciphertext stealing is in place). But for now I implement check for zero length in low-level based on precedent. PR: 3087, 2775
-
- Mar 06, 2014
-
-
Andy Polyakov authored
-
Andy Polyakov authored
Submitted by: Roumen Petrov
-
Andy Polyakov authored
Submitted by: Roumen Petrov
-
- Mar 03, 2014
-
-
Dr. Stephen Henson authored
(cherry picked from commit bdfc0e28)
-
- Mar 01, 2014
-
-
Dr. Stephen Henson authored
Add option to set an alternative to the default hmacWithSHA1 PRF for PKCS#8 private key encryptions. This is used automatically by PKCS8_encrypt if the nid specified is a PRF. Add option to pkcs8 utility. Update docs. (cherry picked from commit b60272b0)
-
Dr. Stephen Henson authored
(cherry picked from commit 124d2188)
-
Dr. Stephen Henson authored
Although the memory allocated by compression methods is fixed and cannot grow over time it can cause warnings in some leak checking tools. The function SSL_COMP_free_compression_methods() will free and zero the list of supported compression methods. This should *only* be called in a single threaded context when an application is shutting down to avoid interfering with existing contexts attempting to look up compression methods. (cherry picked from commit 976c5830)
-
- Feb 28, 2014
-
-
Andy Polyakov authored
PR: 3271
-
- Feb 27, 2014
-
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
- Feb 26, 2014
-
-
Rob Stradling authored
-
Dr. Stephen Henson authored
(cherry picked from commit 3eddd1706a30cdf3dc9278692d8ee9038eac8a0d)
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
- Feb 25, 2014
-
-
Andy Polyakov authored
PR: 3201
-
Andy Polyakov authored
-
Dr. Stephen Henson authored
(cherry picked from commit 3678161d)
-
Dr. Stephen Henson authored
Not all platforms define BN_ULLONG. Define SCTS_TIMESTAMP as a type which should work on all platforms. (cherry picked from commit 66344167)
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
Windows 8 SDKs complain that GetVersion() is deprecated. We only use GetVersion like this: (GetVersion() < 0x80000000) which checks if the Windows version is NT based. Use a macro check_winnt() which uses GetVersion() on older SDK versions and true otherwise.
-
Rob Stradling authored
-
- Feb 24, 2014
-
-
Andy Polyakov authored
Allegedly formwarding to NUL: sometimes creates NUL file in file system. PR: 3250
-
Andy Polyakov authored
PR: 3251 Suggested by: Thorsten Schning
-
Andy Polyakov authored
when adding duplicates in add_cert_dir. PR: 3261 Reported by: Marian Done
-
Andy Polyakov authored
-
- Feb 23, 2014
-
-
Dr. Stephen Henson authored
When setting the current certificate check that it has a corresponding private key.
-
Dr. Stephen Henson authored
New flags to build certificate chains. The can be used to rearrange the chain so all an application needs to do is add all certificates in arbitrary order and then build the chain to check and correct them. Add verify error code when building chain. Update docs.
-
- Feb 21, 2014
-
-
Dr. Stephen Henson authored
-
Andy Polyakov authored
-
- Feb 20, 2014
-
-
Dr. Stephen Henson authored
(cherry picked from commit b709f8ef)
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
- Feb 19, 2014
-
-
Dr. Stephen Henson authored
-