- May 29, 2014
-
-
Dr. Stephen Henson authored
PR#3249 (cherry picked from commit 8909bf20269035d295743fca559207ef2eb84eb3)
-
František Bořánek authored
PR#3278 (cherry picked from commit de56fe797081fc09ebd1add06d6e2df42a324fd5)
-
Martin Kaiser authored
(cherry picked from commit 3820fec3a09faecba7fe9912aa20ef7fcda8337b)
-
- May 25, 2014
-
-
Matt Caswell authored
-
- May 24, 2014
-
-
Ben Laurie authored
-
- May 23, 2014
-
-
Andy Polyakov authored
(cherry picked from commit b83d09f5)
-
- May 22, 2014
-
-
Mike Bland authored
Replaces the entire test with a trivial implementation when OPENSSL_NO_HEARTBEATS is defined.
-
Ben Laurie authored
-
- May 21, 2014
-
-
Matt Caswell authored
-
Matt Caswell authored
-
Ben Laurie authored
-
Ben Laurie authored
-
Viktor Dukhovni authored
Fixes to host checking wild card support and add support for setting host checking flags when verifying a certificate chain. (cherry picked from commit 397a8e74)
-
Dr. Stephen Henson authored
Use triple DES for certificate encryption if no-rc2 is specified. PR#3357
-
Dr. Stephen Henson authored
PR#3357 (cherry picked from commit ca3ffd9670f2b589bf8cc04923f953e06d6fbc58)
-
- May 20, 2014
-
-
Ben Laurie authored
-
Ben Laurie authored
-
Dr. Stephen Henson authored
(cherry picked from commit dcca7b13)
-
Dr. Stephen Henson authored
(cherry picked from commit 6db14dbc)
-
- May 19, 2014
-
-
Janpopan authored
-
Ben Laurie authored
-
- May 18, 2014
-
-
Mike Bland authored
Regression test against CVE-2014-0160 (Heartbleed). More info: http://mike-bland.com/tags/heartbleed.html (based on commit 35cb55988b75573105eefd00d27d0138eebe40b1)
-
- May 15, 2014
-
-
Matt Caswell authored
Moved note about lack of support for AEAD modes out of BUGS section to SUPPORTED CIPHERS section (bug has been fixed, but still no support for AEAD)
-
Dr. Stephen Henson authored
(cherry picked from commit 09184dddead165901700b31eb39d540ba30f93c5)
-
- May 14, 2014
-
-
Jeffrey Walton authored
-
Jeffrey Walton authored
-
Michal Bozon authored
-
- May 12, 2014
-
-
Mike Frysinger authored
various link settings. PR#3332
-
Kurt Roeckx authored
-
Jean-Paul Calderone authored
-
Serguei E. Leontiev authored
Replace manual ASN.1 decoder with ASN1_get object. This will decode the tag and length properly and check against it does not exceed the supplied buffer length. PR#3335 (cherry picked from commit b0308dddd1cc6a8e1de803ef29ba6da25ee072c2)
-
- May 11, 2014
-
-
Matt Caswell authored
-
Kurt Roeckx authored
-
Martin Brejcha authored
PR: 3327
-
Günther Noack authored
PR: 3317
-
Viktor Dukhovni authored
-
Matt Caswell authored
-
Tim Hudson authored
-
- May 09, 2014
-
-
Dr. Stephen Henson authored
If the key type does not match any CMS recipient type return an error instead of using a random key (MMA mitigation). This does not leak any useful information to an attacker. PR#3348 (cherry picked from commit bd43b4cf778a53ffa5d77510ecd408a009dc00d2)
-
- May 08, 2014
-
-
Tim Hudson authored
-