- Mar 04, 2013
-
-
Ben Laurie authored
-
- Mar 01, 2013
-
-
Andy Polyakov authored
-
Andy Polyakov authored
PR: 3004
-
- Feb 26, 2013
-
-
Ben Laurie authored
-
Ben Laurie authored
-
Dr. Stephen Henson authored
Add CMS_RecipientInfo_encrypt: this function encrypts an existing content encryption key to match the key in the RecipientInfo structure: this is useful if a new recpient is added to and existing enveloped data structure. Add documentation.
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
Two example programs one for command line argument processing and one for configuration file processing.
-
Dr. Stephen Henson authored
Fix some typos and update version number first added: it has now been backported to OpenSSL 1.0.2.
-
- Feb 21, 2013
-
-
Ben Laurie authored
Not sure why I am getting these now and not before.
-
Ben Laurie authored
-
- Feb 15, 2013
-
-
Nick Alcock authored
podlators 2.5.0 has switched to dying on POD syntax errors. This means that a bunch of long-standing erroneous POD in the openssl documentation now leads to fatal errors from pod2man, halting installation. Unfortunately POD constraints mean that you have to sort numeric lists in ascending order if they start with 1: you cannot do 1, 0, 2 even if you want 1 to appear first. I've reshuffled such (alas, I wish there were a better way but I don't know of one).
-
Andy Polyakov authored
-
- Feb 14, 2013
-
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
- Feb 12, 2013
-
-
Dr. Stephen Henson authored
Add description of "allocate and encode" operation for ASN1 routines. Document how versioning will for after the letter release reaches y.
-
David Woodhouse authored
The version check for DTLS1_VERSION was redundant as DTLS1_VERSION > TLS1_1_VERSION, however we do need to check for DTLS1_BAD_VER for compatibility. PR:2984
-
- Feb 11, 2013
-
-
Dr. Stephen Henson authored
(cherry picked from commit cbf9b4aed3e209fe8a39e1d6f55aaf46d1369dc4)
-
Dr. Stephen Henson authored
-
Lutz Jaenicke authored
(cherry picked from commit f88dbb8385c199a2a28e9525c6bba3a64bda96af)
-
Andy Polyakov authored
-
- Feb 08, 2013
-
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
It also ensures that valgring is happy.
-
Andy Polyakov authored
Revert is appropriate because binary compatibility is not an issue in 1.1.
-
- Feb 06, 2013
-
-
Adam Langley authored
MD5 should use little endian order. Fortunately the only ciphersuite affected is EXP-RC2-CBC-MD5 (TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5) which is a rarely used export grade ciphersuite. (cherry picked from commit f306b87d766e6ecf30824635c7c395b67cff9dbc)
-
Andy Polyakov authored
(cherry picked from commit 529d27ea472fc2c7ba9190a15a58cb84012d4ec6)
-
Andy Polyakov authored
Address CBC decrypt timing issues and reenable the AESNI+SHA1 stitch. (cherry picked from commit 125093b59f3c2a2d33785b5563d929d0472f1721)
-
Andy Polyakov authored
Kludge alert. This is arranged by passing padding length in unused bits of SSL3_RECORD->type, so that orig_len can be reconstructed. (cherry picked from commit 8bfd4c65)
-
Dr. Stephen Henson authored
(cherry picked from commit 04e45b52ee3be81121359cc1198fd01e38096e9f)
-
Andy Polyakov authored
(cherry picked from commit d5371324d978e4096bf99b9d0fe71b2cb65d9dc8)
-
Andy Polyakov authored
RISCs are picky and alignment granted by compiler for md_state can be insufficient for SHA512. (cherry picked from commit 36260233e7e3396feed884d3f501283e0453c04f)
-
Andy Polyakov authored
Break dependency on uint64_t. It's possible to declare bits as unsigned int, because TLS packets are limited in size and 32-bit value can't overflow. (cherry picked from commit cab13fc8473856a43556d41d8dac5605f4ba1f91)
-
Dr. Stephen Henson authored
(cherry picked from commit 34ab3c8c711ff79c2b768f0b17e4b2a78fd1df5d)
-
Dr. Stephen Henson authored
branches it needs to be in a "gap". (cherry picked from commit 81ce0e14e72e8e255ad1bd9c7cfaa47a6291919c)
-
Dr. Stephen Henson authored
We have to use EVP in FIPS mode so we can only partially mitigate timing differences. Make an extra call to EVP_DigestSignUpdate to hash additonal blocks to cover any timing differences caused by removal of padding. (cherry picked from commit b908e88e)
-