- 24 Feb, 2014 3 commits
-
-
Andy Polyakov authored
PR: 3251 Suggested by: Thorsten Schöning
-
Andy Polyakov authored
PR: 3251 Suggested by: Thorsten Schning (cherry picked from commit 779c51c6)
-
Andy Polyakov authored
when adding duplicates in add_cert_dir. PR: 3261 Reported by: Marian Done (cherry picked from commit 758954e0)
-
- 15 Feb, 2014 2 commits
-
-
Dr. Stephen Henson authored
(cherry picked from commit c55fef76) Conflicts: util/pl/VC-32.pl
-
Dr. Stephen Henson authored
(cherry picked from commit 5a7652c3)
-
- 14 Feb, 2014 5 commits
-
-
Kurt Roeckx authored
If you use "-newkey rsa" it's supposed to read the default number of bits from the config file. However the value isn't used to generate the key, but it does print it's generating such a key. The set_keygen_ctx() doesn't call EVP_PKEY_CTX_set_rsa_keygen_bits() and you end up with the default set in pkey_rsa_init() (1024). Afterwards the number of bits gets read from the config file, but nothing is done with that anymore. We now read the config first and use the value from the config file when no size is given. PR: 2592 (cherry picked from commit 33432203)
-
Kurt Roeckx authored
(cherry picked from commit e547c45f)
-
Scott Schaefer authored
(cherry picked from commit 2b4ffc65)
-
Scott Schaefer authored
apps/pkcs12.c accepts -password as an argument. The document author almost certainly meant to write "-password, -passin". However, that is not correct, either. Actually the code treats -password as equivalent to -passin, EXCEPT when -export is also specified, in which case -password as equivalent to -passout. (cherry picked from commit 856c6dfb)
-
Dr. Stephen Henson authored
(cherry picked from commit 8c6d8c2a) Conflicts: CHANGES ssl/t1_lib.c
-
- 05 Feb, 2014 1 commit
-
-
Dr. Stephen Henson authored
(cherry picked from commit 8c6d8c2a) Conflicts: CHANGES ssl/t1_lib.c
-
- 03 Feb, 2014 1 commit
-
-
Dr. Stephen Henson authored
PR#3253 (cherry picked from commit 7f6e09b5)
-
- 29 Jan, 2014 1 commit
-
-
Dr. Stephen Henson authored
Remove reference to ERR_TXT_MALLOCED in the error library as that is only used internally. Indicate that returned error data must not be freed. (cherry picked from commit f2d678e6)
-
- 28 Jan, 2014 4 commits
-
-
Dr. Stephen Henson authored
(cherry picked from commit cb218267)
-
Dr. Stephen Henson authored
(cherry picked from commit 717cc858)
-
Dr. Stephen Henson authored
PR#3244
-
Dr. Stephen Henson authored
Always add a dynamically loaded ENGINE to list. Otherwise it can cause problems when multiply loaded, especially if it adds new public key methods. For all current engines we only want a single implementation anyway. (cherry picked from commit e933f91f)
-
- 23 Jan, 2014 1 commit
-
-
Dr. Stephen Henson authored
Use default instead of ENGINE version of digest. Without this errors will occur if you use an ENGINE for a private key and it doesn't implement the digest in question.
-
- 16 Jan, 2014 1 commit
-
-
Kaspar Brand authored
PR#3178
-
- 11 Jan, 2014 1 commit
-
-
Zoltan Arpadffy authored
-
- 09 Jan, 2014 1 commit
-
-
Dr. Stephen Henson authored
(cherry picked from commit 8f4077ca)
-
- 08 Jan, 2014 3 commits
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
PR#3220
-
- 06 Jan, 2014 5 commits
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
- 04 Jan, 2014 1 commit
-
-
Dr. Stephen Henson authored
The flag SSL_OP_MSIE_SSLV2_RSA_PADDING hasn't done anything since OpenSSL 0.9.7h but deleting it will break source compatibility with any software that references it. Restore it but #define to zero. (cherry picked from commit b17d6b8d)
-
- 02 Jan, 2014 2 commits
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
When sending an invalid version number alert don't change the version number to the client version if a session is already established. Thanks to Marek Majkowski for additional analysis of this issue. PR#3191
-
- 22 Dec, 2013 1 commit
-
-
Dr. Stephen Henson authored
(cherry picked from commit 8f686789)
-
- 20 Dec, 2013 2 commits
-
-
Dr. Stephen Henson authored
For DTLS we might need to retransmit messages from the previous session so keep a copy of write context in DTLS retransmission buffers instead of replacing it after sending CCS. CVE-2013-6450.
-
Dr. Stephen Henson authored
-
- 19 Dec, 2013 1 commit
-
-
Dr. Stephen Henson authored
When deciding whether to use TLS 1.2 PRF and record hash algorithms use the version number in the corresponding SSL_METHOD structure instead of the SSL structure. The SSL structure version is sometimes inaccurate. Note: OpenSSL 1.0.2 and later effectively do this already. (CVE-2013-6449)
-
- 18 Dec, 2013 2 commits
-
-
Andy Polyakov authored
SHA512_Transform was initially added rather as tribute to tradition than for practucal reasons. But use was recently found in ssl/s3_cbc.c and it turned to be problematic on platforms that don't tolerate misasligned references to memory and lack assembly subroutine. (cherry picked from commit cdd1acd7)
-
Dr. Stephen Henson authored
Partial mitigation of PR#3200
-
- 10 Dec, 2013 2 commits
-
-
Dr. Stephen Henson authored
We need to lock when *not* in FIPS mode. (cherry picked from commit 57c4e42d)
-
Dr. Stephen Henson authored
-