Skip to content
  1. Nov 24, 2008
  2. Nov 19, 2008
  3. Nov 15, 2008
    • Dr. Stephen Henson's avatar
      PR: 1574 · 12bf56c0
      Dr. Stephen Henson authored
      Submitted by: Jouni Malinen <j@w1.fi>
      Approved by: steve@openssl.org
      
      Ticket override support for EAP-FAST.
      12bf56c0
  4. Nov 12, 2008
  5. Nov 02, 2008
  6. Oct 26, 2008
  7. Oct 14, 2008
  8. Oct 12, 2008
  9. Oct 07, 2008
  10. Sep 22, 2008
  11. Sep 15, 2008
  12. Sep 14, 2008
  13. Sep 01, 2008
  14. Aug 29, 2008
  15. Aug 27, 2008
  16. Aug 20, 2008
  17. Aug 13, 2008
  18. Aug 12, 2008
  19. Aug 08, 2008
  20. Aug 06, 2008
    • Geoff Thorpe's avatar
      Remove the dual-callback scheme for numeric and pointer thread IDs, · 4c329696
      Geoff Thorpe authored
      deprecate the original (numeric-only) scheme, and replace with the
      CRYPTO_THREADID object. This hides the platform-specifics and should reduce
      the possibility for programming errors (where failing to explicitly check
      both thread ID forms could create subtle, platform-specific bugs).
      
      Thanks to Bodo, for invaluable review and feedback.
      4c329696
  21. Jul 30, 2008
  22. Jul 03, 2008
  23. Jun 26, 2008
  24. Jun 23, 2008
  25. Jun 09, 2008
  26. Jun 05, 2008
  27. Jun 04, 2008
  28. Jun 03, 2008
  29. Jun 01, 2008
  30. May 28, 2008
    • Bodo Möller's avatar
      sync with 0.9.8 branch · 2cd81830
      Bodo Möller authored
      2cd81830
    • Bodo Möller's avatar
      From HEAD: · e194fe8f
      Bodo Möller authored
      Fix flaw if 'Server Key exchange message' is omitted from a TLS
      handshake which could lead to a cilent crash as found using the
      Codenomicon TLS test suite (CVE-2008-1672)
      
      Reviewed by: openssl-security@openssl.org
      
      Obtained from: mark@awe.com
      e194fe8f
    • Bodo Möller's avatar
      From HEAD: · 40a70628
      Bodo Möller authored
      Fix double-free in TLS server name extensions which could lead to a remote
      crash found by Codenomicon TLS test suite (CVE-2008-0891)
      
      Reviewed by: openssl-security@openssl.org
      
      Obtained from: jorton@redhat.com
      40a70628
  31. May 26, 2008