- Oct 19, 2011
-
-
Dr. Stephen Henson authored
-
Bodo Möller authored
Submitted by: Emilia Kasper (Google)
-
Bodo Möller authored
Also, use the common Configure mechanism for enabling/disabling the 64-bit ECC code.
-
- Oct 18, 2011
-
-
Bodo Möller authored
NIST-P521. (Now -DEC_NISTP_64_GCC_128 enables all three of these; -DEC_NISTP224_64_GCC_128 no longer works.) Submitted by: Google Inc.
-
- Oct 13, 2011
-
-
Bodo Möller authored
-
Bodo Möller authored
Submitted by: Bob Buckholz <bbuckholz@google.com>
-
- Oct 09, 2011
-
-
Dr. Stephen Henson authored
-
- Sep 29, 2011
-
-
Dr. Stephen Henson authored
-
- Sep 22, 2011
-
-
Dr. Stephen Henson authored
Add explanatory comments to health check code.
-
- Sep 21, 2011
-
-
Dr. Stephen Henson authored
One demand health check function. Perform generation test in fips_test_suite. Option to skip dh test if fips_test_suite.
-
- Sep 14, 2011
-
-
Dr. Stephen Henson authored
-
- Sep 12, 2011
-
-
Dr. Stephen Henson authored
for all DRBG combinations.
-
- Sep 09, 2011
-
-
Dr. Stephen Henson authored
tests and POST code.
-
- Sep 06, 2011
-
-
Dr. Stephen Henson authored
produce an error (CVE-2011-3207)
-
- Sep 05, 2011
-
-
Bodo Möller authored
-
Bodo Möller authored
-
Bodo Möller authored
Submitted by: Adam Langley
-
Bodo Möller authored
-
Bodo Möller authored
-
- Aug 26, 2011
-
-
Dr. Stephen Henson authored
Modify fips_dssvs to support appropriate file format.
-
- Aug 23, 2011
-
-
Andy Polyakov authored
-
- Aug 14, 2011
-
-
Dr. Stephen Henson authored
using OBJ xref utilities instead of string comparison with OID name. This removes the arbitrary restriction on using SHA1 only with some ECC ciphersuites.
-
- Aug 08, 2011
-
-
Dr. Stephen Henson authored
-
- Aug 03, 2011
-
-
Dr. Stephen Henson authored
invocation field. Add complete support for AES GCM ciphersuites including all those in RFC5288 and RFC5289.
-
- Jul 25, 2011
-
-
Dr. Stephen Henson authored
-
- Jul 04, 2011
-
-
Dr. Stephen Henson authored
-
- Jun 15, 2011
-
-
Bodo Möller authored
into 1.0.1 should not be listed as "changes between 1.0.1 and 1.0.0". This makes the OpenSSL_1_0_1-stable and HEAD versions of this file consistent with each other (the HEAD version has the additional 1.1.0 section, but doesn't otherwise differ).
-
- May 30, 2011
-
-
Dr. Stephen Henson authored
-
- May 25, 2011
-
-
Dr. Stephen Henson authored
http://eprint.iacr.org/2011/232.pdf Thanks to the original authors Billy Bob Brumley and Nicola Tuveri for bringing this to our attention.
-
- May 20, 2011
-
-
Dr. Stephen Henson authored
Submitted by: Alexei Khlebnikov <alexei.khlebnikov@opera.com> Reviewed by: steve OOM checking. Leak in OOM fix. Fall-through comment. Duplicate code elimination.
-
- May 19, 2011
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
- May 12, 2011
-
-
Dr. Stephen Henson authored
Parse certificate request message and set digests appropriately. Generate new TLS v1.2 format certificate verify message. Keep handshake caches around for longer as they are needed for client auth.
-
- May 11, 2011
-
-
Dr. Stephen Henson authored
the FIPS capable OpenSSL.
-
- May 09, 2011
-
-
Dr. Stephen Henson authored
algorithms extension (including everything we support). Swicth to new signature format where needed and relax ECC restrictions. Not TLS v1.2 client certifcate support yet but client will handle case where a certificate is requested and we don't have one.
-
- May 06, 2011
-
-
Dr. Stephen Henson authored
signature algorithms extension and correct signature format for server key exchange. All ciphersuites should now work on the server but no client support and no client certificate support yet.
-
- Apr 29, 2011
-
-
Dr. Stephen Henson authored
checking added, SHA256 PRF support added. At present only RSA key exchange ciphersuites work with TLS v1.2 as the new signature format is not yet implemented.
-
Dr. Stephen Henson authored
OPENSSL_NO_SSL_INTERN all ssl related structures are opaque and internals cannot be directly accessed. Many applications will need some modification to support this and most likely some additional functions added to OpenSSL. The advantage of this option is that any application supporting it will still be binary compatible if SSL structures change.
-
- Apr 23, 2011
-
-
Dr. Stephen Henson authored
callback. Handle case where no multiple of the block size is in the interval [min_len, max_len].
-
Dr. Stephen Henson authored
-