- 24 Oct, 2006 1 commit
-
-
Andy Polyakov authored
-
- 23 Oct, 2006 6 commits
-
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
recent mingw modifications.
-
Andy Polyakov authored
-
- 21 Oct, 2006 2 commits
-
-
Andy Polyakov authored
such as MSYS with "native" Win32 perl.
-
Andy Polyakov authored
-
- 20 Oct, 2006 2 commits
-
-
Andy Polyakov authored
-
Andy Polyakov authored
-
- 19 Oct, 2006 1 commit
-
-
Andy Polyakov authored
-
- 18 Oct, 2006 2 commits
-
-
Andy Polyakov authored
-
Andy Polyakov authored
-
- 17 Oct, 2006 8 commits
-
-
Andy Polyakov authored
-
Andy Polyakov authored
for low-level SHA block routines.
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
- 11 Oct, 2006 1 commit
-
-
Andy Polyakov authored
redundant as result.
-
- 05 Oct, 2006 1 commit
-
-
Dr. Stephen Henson authored
-
- 04 Oct, 2006 2 commits
-
-
Nils Larsch authored
-
Bodo Möller authored
happen; the new code for the OID cross reference table failed to do so.
-
- 03 Oct, 2006 1 commit
-
-
Dr. Stephen Henson authored
create, free and set default CRL method.
-
- 29 Sep, 2006 1 commit
-
-
Mark J. Cox authored
Steve Kiernan
-
- 28 Sep, 2006 6 commits
-
-
Bodo Möller authored
the redundant entries under the 0.9.9 heading.
-
Bodo Möller authored
cause a denial of service. (CVE-2006-2940) [Steve Henson, Bodo Moeller]
-
Bodo Möller authored
-
Mark J. Cox authored
in a denial of service. (CVE-2006-2937) [Steve Henson]
-
Mark J. Cox authored
(CVE-2006-3738) [Tavis Ormandy and Will Drewry, Google Security Team] Fix SSL client code which could crash if connecting to a malicious SSLv2 server. (CVE-2006-4343) [Tavis Ormandy and Will Drewry, Google Security Team]
-
Richard Levitte authored
1) Certificate Message with no certs OpenSSL implementation sends the Certificate message during SSL handshake, however as per the specification, these have been omitted. -- RFC 2712 -- CertificateRequest, and the ServerKeyExchange shown in Figure 1 will be omitted since authentication and the establishment of a master secret will be done using the client's Kerberos credentials for the TLS server. The client's certificate will be omitted for the same reason. -- RFC 2712 -- 3) Pre-master secret Protocol version The pre-master secret generated by OpenSSL does not have the correct client version. RFC 2712 says, if the Kerberos option is selected, the pre-master secret structure is the same as that used in the RSA case. TLS specification defines pre-master secret as: struct { ProtocolVersion client_version; opaque random[46]; } PreMasterSecret; where client_version is the latest protocol version supported by the client The pre-master secret generated by OpenSSL does not have the correct client version. The implementation does not update the first 2 bytes of random secret for Kerberos Cipher suites. At the server-end, the client version from the pre-master secret is not validated. PR: 1336
-
- 26 Sep, 2006 1 commit
-
-
Dr. Stephen Henson authored
-
- 25 Sep, 2006 1 commit
-
-
Richard Levitte authored
-
- 23 Sep, 2006 1 commit
-
-
Dr. Stephen Henson authored
Reviewed by: steve
-
- 22 Sep, 2006 3 commits
-
-
Dr. Stephen Henson authored
PR:1374
-
Dr. Stephen Henson authored
PR:1348
-
Dr. Stephen Henson authored
-