Skip to content
  1. Jan 11, 2014
  2. Jan 10, 2014
  3. Jan 09, 2014
  4. Jan 06, 2014
  5. Jan 04, 2014
    • Dr. Stephen Henson's avatar
      Restore SSL_OP_MSIE_SSLV2_RSA_PADDING · 1b0d4812
      Dr. Stephen Henson authored
      The flag SSL_OP_MSIE_SSLV2_RSA_PADDING hasn't done anything since OpenSSL
      0.9.7h but deleting it will break source compatibility with any software
      that references it. Restore it but #define to zero.
      (cherry picked from commit b17d6b8d)
      1b0d4812
  6. Jan 02, 2014
  7. Dec 20, 2013
  8. Dec 10, 2013
  9. Dec 09, 2013
  10. Nov 27, 2013
  11. Nov 11, 2013
  12. Nov 09, 2013
  13. Nov 08, 2013
  14. Nov 06, 2013
  15. Nov 05, 2013
  16. Oct 04, 2013
  17. Oct 03, 2013
  18. Oct 01, 2013
  19. Sep 30, 2013
  20. Sep 16, 2013
    • Bodo Moeller's avatar
      Sync CHANGES and NEWS files. · f11bedf8
      Bodo Moeller authored
      f11bedf8
    • Bodo Moeller's avatar
      Fix overly lenient comparisons: · c23746f3
      Bodo Moeller authored
          - EC_GROUP_cmp shouldn't consider curves equal just because
            the curve name is the same. (They really *should* be the same
            in this case, but there's an EC_GROUP_set_curve_name API,
            which could be misused.)
      
          - EC_POINT_cmp shouldn't return 0 for ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED
            or EC_R_INCOMPATIBLE_OBJECTS errors because in a cmp API, 0 indicates
            equality (not an error).
      
          Reported by: king cope
      
      (cherry picked from commit 312a46791ab465cfa3bf26764361faed0e5df014)
      c23746f3
  21. Sep 10, 2013
  22. Sep 09, 2013
  23. Aug 20, 2013
  24. Aug 13, 2013
    • Michael Tuexen's avatar
      DTLS message_sequence number wrong in rehandshake ServerHello · 6f87807e
      Michael Tuexen authored
      This fix ensures that
      * A HelloRequest is retransmitted if not responded by a ClientHello
      * The HelloRequest "consumes" the sequence number 0. The subsequent
      ServerHello uses the sequence number 1.
      * The client also expects the sequence number of the ServerHello to
      be 1 if a HelloRequest was received earlier.
      This patch fixes the RFC violation.
      (cherry picked from commit b62f4daa)
      
      Conflicts:
      
      	ssl/d1_pkt.c
      6f87807e
  25. Aug 08, 2013
    • Michael Tuexen's avatar
      DTLS handshake fix. · 799f203f
      Michael Tuexen authored
      Reported by: Prashant Jaikumar <rmstar@gmail.com>
      
      Fix handling of application data received before a handshake.
      (cherry picked from commit 0c75eeac)
      799f203f
  26. Aug 06, 2013
    • Dr. Stephen Henson's avatar
      Fix verify loop with CRL checking. · 34eee354
      Dr. Stephen Henson authored
      PR #3090
      Reported by: Franck Youssef <fry@open.ch>
      
      If no new reason codes are obtained after checking a CRL exit with an
      error to avoid repeatedly checking the same CRL.
      
      This will only happen if verify errors such as invalid CRL scope are
      overridden in a callback.
      (cherry picked from commit 4b26645c)
      34eee354
    • Kaspar Brand's avatar
      Fix for PEM_X509_INFO_read_bio. · bcd092d7
      Kaspar Brand authored
      PR: 3028
      Fix bug introduced in PEM_X509_INFO_bio which wouldn't process RSA keys
      correctly if they appeared first.
      (cherry picked from commit 5ae8d6bc)
      bcd092d7
  27. Jun 30, 2013
  28. Apr 08, 2013
  29. Mar 31, 2013
  30. Mar 19, 2013