- May 31, 2014
-
-
Dr. Stephen Henson authored
PR#3319 (cherry picked from commit 84691390eae86befd33c83721dacedb539ae34e6)
-
Dr. Stephen Henson authored
(cherry picked from commit 2c575907d2c8601a18716f718ce309ed4e1f1783)
-
- May 30, 2014
-
-
Hubert Kario authored
the verify app man page didn't describe the usage of attime option even though it was listed as a valid option in the -help message. This patch fixes this omission.
-
Hubert Kario authored
While the -help message references this option, the man page doesn't mention the -no_ecdhe option. This patch fixes this omission.
-
- May 29, 2014
-
-
Dr. Stephen Henson authored
PR#3249 (cherry picked from commit 8909bf20269035d295743fca559207ef2eb84eb3)
-
František Bořánek authored
PR#3278 (cherry picked from commit de56fe797081fc09ebd1add06d6e2df42a324fd5)
-
Martin Kaiser authored
(cherry picked from commit 3820fec3a09faecba7fe9912aa20ef7fcda8337b)
-
- May 27, 2014
-
-
Peter Mosmans authored
-
- May 26, 2014
-
-
Matt Caswell authored
-
- May 25, 2014
-
-
Matt Caswell authored
-
- May 24, 2014
-
-
Matt Caswell authored
-
- May 22, 2014
-
-
Mike Bland authored
Replaces the entire test with a trivial implementation when OPENSSL_NO_HEARTBEATS is defined.
-
- May 21, 2014
-
-
Matt Caswell authored
-
Dr. Stephen Henson authored
Use triple DES for certificate encryption if no-rc2 is specified. PR#3357 (cherry picked from commit 4689c08453e95eeefcc88c9f32dc6e509f95caff)
-
Dr. Stephen Henson authored
PR#3357 (cherry picked from commit ca3ffd9670f2b589bf8cc04923f953e06d6fbc58)
-
- May 20, 2014
-
-
Dr. Stephen Henson authored
(cherry picked from commit dcca7b13)
-
- May 19, 2014
-
-
Janpopan authored
-
Ben Laurie authored
-
Mike Bland authored
Regression test against CVE-2014-0160 (Heartbleed). More info: http://mike-bland.com/tags/heartbleed.html (based on commit 35cb55988b75573105eefd00d27d0138eebe40b1)
-
Ben Laurie authored
-
Ben Laurie authored
-
- May 15, 2014
-
-
Matt Caswell authored
Moved note about lack of support for AEAD modes out of BUGS section to SUPPORTED CIPHERS section (bug has been fixed, but still no support for AEAD)
-
Dr. Stephen Henson authored
-
- May 14, 2014
-
-
Jeffrey Walton authored
-
Jeffrey Walton authored
-
Michal Bozon authored
-
- May 12, 2014
-
-
Kurt Roeckx authored
-
Jean-Paul Calderone authored
-
Serguei E. Leontiev authored
Replace manual ASN.1 decoder with ASN1_get object. This will decode the tag and length properly and check against it does not exceed the supplied buffer length. PR#3335 (cherry picked from commit b0308dddd1cc6a8e1de803ef29ba6da25ee072c2)
-
- May 11, 2014
-
-
Matt Caswell authored
-
Kurt Roeckx authored
-
Martin Brejcha authored
PR: 3327
-
Günther Noack authored
PR: 3317
-
Viktor Dukhovni authored
-
Tim Hudson authored
-
- May 09, 2014
-
-
Dr. Stephen Henson authored
If the key type does not match any CMS recipient type return an error instead of using a random key (MMA mitigation). This does not leak any useful information to an attacker. PR#3348
-
- May 08, 2014
-
-
Tim Hudson authored
-
Tim Hudson authored
-
- May 07, 2014
-
-
Tim Hudson authored
-
Matt Caswell authored
-