- Apr 26, 2014
- Apr 25, 2014
-
-
Geoff Thorpe authored
-
Geoff Thorpe authored
There are certainly many more constifiable strings in the various interfaces, which I hope to get to eventually. Signed-off-by: Geoff Thorpe <geoff@openssl.org>
-
Geoff Thorpe authored
Gets rid of this; defined(@array) is deprecated at ../util/mkerr.pl line 792. (Maybe you should just omit the defined()?) defined(@array) is deprecated at ../util/mkerr.pl line 800. (Maybe you should just omit the defined()?) Signed-off-by: Geoff Thorpe <geoff@openssl.org>
-
Mark J. Cox authored
to keep up to date with releases. Reported because http://www.openssl.org/support/faq.html#MISC1 was out of date
-
Geoff Thorpe authored
o_time.h was removed in commit ff49a944 , which breaks "make update" unless mkdir.pl is updated accordingly. Signed-off-by: Geoff Thorpe <geoff@openssl.org>
-
- Apr 24, 2014
-
-
Steve Marquess authored
-
Andy Polyakov authored
algorithm suggested in following paper: Câmara, D.; Gouvêa, C. P. L.; López, J. & Dahab, R.: Fast Software Polynomial Multiplication on ARM Processors using the NEON Engine. http://conradoplg.cryptoland.net/files/2010/12/mocrysen13.pdf
-
Andy Polyakov authored
-
- Apr 23, 2014
-
-
Ben Laurie authored
-
- Apr 22, 2014
-
-
Ben Laurie authored
-
- Apr 21, 2014
-
-
Kaspar Brand authored
Fix typo that stopped SSL_CTX_get_{first,next}_certificate from working.
-
- Apr 16, 2014
-
-
Dr. Stephen Henson authored
-
- Apr 15, 2014
-
-
Dr. Stephen Henson authored
When looking for an extension we need to set the last found position to -1 to properly search all extensions. PR#3309.
-
Dr. Stephen Henson authored
-
- Apr 11, 2014
-
-
Dr. Stephen Henson authored
-
- Apr 09, 2014
-
-
Dr. Stephen Henson authored
Keep copy of any host, path and port values allocated by OCSP_parse_url and free as necessary.
-
Dr. Stephen Henson authored
-
- Apr 08, 2014
-
-
Dr. Stephen Henson authored
-
- Apr 07, 2014
-
-
Dr. Stephen Henson authored
Treat a zero length passed to ssleay_rand_add a no op: the existing logic zeroes the md value which is very bad. OpenSSL itself never does this internally and the actual call doesn't make sense as it would be passing zero bytes of entropy. Thanks to Marcus Meissner <meissner@suse.de> for reporting this bug. (cherry picked from commit 5be1ae28ef3c4bdec95b94f14e0e939157be550a)
-
Dr. Stephen Henson authored
A missing bounds check in the handling of the TLS heartbeat extension can be used to reveal up to 64k of memory to a connected client or server. Thanks for Neel Mehta of Google Security for discovering this bug and to Adam Langley <agl@chromium.org> and Bodo Moeller <bmoeller@acm.org> for preparing the fix (CVE-2014-0160) (cherry picked from commit 96db9023)
-
Dr. Stephen Henson authored
-
- Apr 06, 2014
-
-
Andy Polyakov authored
-
Andy Polyakov authored
-
- Apr 05, 2014
-
-
Dr. Stephen Henson authored
Enable TLS padding extension using official value from: http://www.iana.org/assignments/tls-extensiontype-values/tls-extensiontype-values.xhtml
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
- Apr 04, 2014
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
Use bufsiz - 1 not BUFSIZ - 1 when prompting for a password in the openssl utility. Thanks to Rob Mackinnon, Leviathan Security for reporting this issue.
-
- Apr 03, 2014
-
-
Dr. Stephen Henson authored
-
Tim Hudson authored
New -hash_old to generate CRL hashes using old (before OpenSSL 1.0.0) algorithm.
-
- Apr 02, 2014
-
-
Eric Young authored
A short PEM encoded sequence if passed to the BIO, and the file had 2 \n following would fail. PR#3289
-
- Apr 01, 2014
-
-
Dr. Stephen Henson authored
Add additional check to catch this in ASN1_item_verify too. (cherry picked from commit 66e8211c)
-
- Mar 29, 2014
-
-
Ben Laurie authored
-
- Mar 28, 2014
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
Allow setting of security level in cipher string using the @SECLEVEL=N syntax.
-
Dr. Stephen Henson authored
Since ssltest needs to test low security ciphersuites and keys set security level to zero so they aren't rejected.
-
Dr. Stephen Henson authored
Add a debugging security callback option to s_client/s_server. This will print out each security parameter as it is accepted or rejected.
-
Dr. Stephen Henson authored
Security callback: selects which parameters are permitted including sensible defaults based on bits of security. The "parameters" which can be selected include: ciphersuites, curves, key sizes, certificate signature algorithms, supported signature algorithms, DH parameters, SSL/TLS version, session tickets and compression. In some cases prohibiting the use of a parameters will mean they are not advertised to the peer: for example cipher suites and ECC curves. In other cases it will abort the handshake: e.g DH parameters or the peer key size. Documentation to follow...
-