- Sep 22, 2013
-
-
Dr. Stephen Henson authored
-
- Sep 16, 2013
-
-
Rob Stradling authored
-
Rob Stradling authored
-
Rob Stradling authored
-
Rob Stradling authored
-
Rob Stradling authored
OS X 10.8..10.8.3 has broken support for ECDHE-ECDSA ciphers.
-
Ben Laurie authored
-
Andy Polyakov authored
-
Andy Polyakov authored
previous cbc128.c commit].
-
Andy Polyakov authored
-
Bodo Moeller authored
-
Bodo Moeller authored
- EC_GROUP_cmp shouldn't consider curves equal just because the curve name is the same. (They really *should* be the same in this case, but there's an EC_GROUP_set_curve_name API, which could be misused.) - EC_POINT_cmp shouldn't return 0 for ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED or EC_R_INCOMPATIBLE_OBJECTS errors because in a cmp API, 0 indicates equality (not an error). Reported by: king cope (cherry picked from commit 312a46791ab465cfa3bf26764361faed0e5df014)
-
- Sep 15, 2013
-
-
Andy Polyakov authored
PR: 3125 Submitted by: Kyle McMartin (cherry picked from commit 8e52a906)
-
- Aug 20, 2013
-
-
Dr. Stephen Henson authored
(cherry picked from commit 3a918ea2bbf4175d9461f81be1403d3781b2c0dc)
-
- Aug 13, 2013
-
-
Michael Tuexen authored
This fix ensures that * A HelloRequest is retransmitted if not responded by a ClientHello * The HelloRequest "consumes" the sequence number 0. The subsequent ServerHello uses the sequence number 1. * The client also expects the sequence number of the ServerHello to be 1 if a HelloRequest was received earlier. This patch fixes the RFC violation. (cherry picked from commit b62f4daa)
-
- Aug 08, 2013
-
-
Michael Tuexen authored
Reported by: Prashant Jaikumar <rmstar@gmail.com> Fix handling of application data received before a handshake. (cherry picked from commit 0c75eeac)
-
- Aug 06, 2013
-
-
Dr. Stephen Henson authored
PR #3090 Reported by: Franck Youssef <fry@open.ch> If no new reason codes are obtained after checking a CRL exit with an error to avoid repeatedly checking the same CRL. This will only happen if verify errors such as invalid CRL scope are overridden in a callback. (cherry picked from commit 4b26645c)
-
Kaspar Brand authored
PR: 3028 Fix bug introduced in PEM_X509_INFO_bio which wouldn't process RSA keys correctly if they appeared first. (cherry picked from commit 5ae8d6bc)
-
- Aug 03, 2013
-
-
Andy Polyakov authored
Bug would emerge when XTS is added to bsaes-armv7.pl. Pointed out by Ard Biesheuvel of Linaro. (cherry picked from commit 044f63086051d7542fa9485a1432498c39c4d8fa)
-
- Jul 31, 2013
-
-
Andy Polyakov authored
-
- Jun 30, 2013
-
-
Andy Polyakov authored
Submitted by: Bryan Drewery PR: 3075 (cherry picked from commit c256e69d)
-
Andy Polyakov authored
PR: 3074 (cherry picked from commit 02450ec6)
-
- Jun 12, 2013
-
-
Dr. Stephen Henson authored
(cherry picked from commit 90e7f983)
-
- May 30, 2013
-
-
Dr. Stephen Henson authored
-
- May 05, 2013
-
-
Dr. Stephen Henson authored
Fix PSS signature printing: consistently use 0x prefix for hex values for padding length and trailer fields. (cherry picked from commit deb24ad53147f5a8dd63416224a5edd7bbc0e74a)
-
- May 03, 2013
-
-
Dr. Stephen Henson authored
(cherry picked from commit 96940f4f2d0300c033379a87db0ff19e598c6264)
-
- May 02, 2013
-
-
Dr. Stephen Henson authored
Reencode certificates in X509_sign_ctx as well as X509_sign. This was causing a problem in the x509 application when it modified an existing certificate. (cherry picked from commit c6d8adb8)
-
- Apr 13, 2013
-
-
Andy Polyakov authored
While ARMv7 in general is capable of unaligned access, not all instructions actually are. And trouble is that compiler doesn't seem to differentiate those capable and incapable of unaligned access. Side effect is that kernel goes into endless loop retrying same instruction triggering unaligned trap. Problem was observed in xts128.c and ccm128.c modules. It's possible to resolve it by using (volatile u32*) casts, but letting STRICT_ALIGNMENT be feels more appropriate. (cherry picked from commit 3bdd8052)
-
- Apr 08, 2013
-
-
Dr. Stephen Henson authored
(cherry picked from commit 04638f2f)
-
- Mar 31, 2013
-
-
Dr. Stephen Henson authored
(cherry picked from commit 0ded2a06)
-
- Mar 28, 2013
-
-
Dr. Stephen Henson authored
-
- Mar 26, 2013
-
-
Matt Caswell authored
Don't check for binary curves by checking methods: the values will be different in FIPS mode as they are redirected to the validated module version. (cherry picked from commit 94782e0e)
-
- Mar 19, 2013
-
-
Dr. Stephen Henson authored
The only standard compression method is stateful and is incompatible with DTLS. (cherry picked from commit e14b8410)
-
- Mar 18, 2013
-
-
Andy Polyakov authored
PR: 3005 (cherry picked from commit 5702e965)
-
Andy Polyakov authored
PR: 3002 (cherry picked from commit 5c600465)
-
Michael Tuexen authored
(cherry picked from commit 80ccc66d)
-
Dr. Stephen Henson authored
If an ASN1_INTEGER structure is allocated but not explicitly set encode it as zero: don't generate an invalid zero length INTEGER. (cherry picked from commit 1643edc6)
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
(cherry picked from commit 1546fb78)
-
- Mar 01, 2013
-
-
Andy Polyakov authored
(cherry picked from commit 342dbbbe)
-