1. 29 Jan, 2014 1 commit
    • Dr. Stephen Henson's avatar
      Clarify docs. · 8e04001f
      Dr. Stephen Henson authored
      Remove reference to ERR_TXT_MALLOCED in the error library as that is
      only used internally. Indicate that returned error data must not be
      freed.
      (cherry picked from commit f2d678e6)
      8e04001f
  2. 28 Jan, 2014 3 commits
  3. 23 Jan, 2014 2 commits
  4. 16 Jan, 2014 1 commit
  5. 11 Jan, 2014 1 commit
  6. 10 Jan, 2014 1 commit
  7. 09 Jan, 2014 1 commit
  8. 06 Jan, 2014 3 commits
  9. 04 Jan, 2014 1 commit
    • Dr. Stephen Henson's avatar
      Restore SSL_OP_MSIE_SSLV2_RSA_PADDING · 1b0d4812
      Dr. Stephen Henson authored
      The flag SSL_OP_MSIE_SSLV2_RSA_PADDING hasn't done anything since OpenSSL
      0.9.7h but deleting it will break source compatibility with any software
      that references it. Restore it but #define to zero.
      (cherry picked from commit b17d6b8d)
      1b0d4812
  10. 02 Jan, 2014 1 commit
  11. 20 Dec, 2013 2 commits
  12. 10 Dec, 2013 1 commit
  13. 09 Dec, 2013 1 commit
  14. 27 Nov, 2013 1 commit
  15. 11 Nov, 2013 1 commit
  16. 09 Nov, 2013 2 commits
  17. 08 Nov, 2013 1 commit
  18. 06 Nov, 2013 1 commit
  19. 05 Nov, 2013 1 commit
  20. 04 Oct, 2013 2 commits
  21. 03 Oct, 2013 1 commit
  22. 01 Oct, 2013 1 commit
  23. 30 Sep, 2013 1 commit
  24. 16 Sep, 2013 2 commits
    • Bodo Moeller's avatar
      Sync CHANGES and NEWS files. · f11bedf8
      Bodo Moeller authored
      f11bedf8
    • Bodo Moeller's avatar
      Fix overly lenient comparisons: · c23746f3
      Bodo Moeller authored
          - EC_GROUP_cmp shouldn't consider curves equal just because
            the curve name is the same. (They really *should* be the same
            in this case, but there's an EC_GROUP_set_curve_name API,
            which could be misused.)
      
          - EC_POINT_cmp shouldn't return 0 for ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED
            or EC_R_INCOMPATIBLE_OBJECTS errors because in a cmp API, 0 indicates
            equality (not an error).
      
          Reported by: king cope
      
      (cherry picked from commit 312a46791ab465cfa3bf26764361faed0e5df014)
      c23746f3
  25. 10 Sep, 2013 3 commits
  26. 09 Sep, 2013 2 commits
  27. 20 Aug, 2013 1 commit
  28. 13 Aug, 2013 1 commit
    • Michael Tuexen's avatar
      DTLS message_sequence number wrong in rehandshake ServerHello · 6f87807e
      Michael Tuexen authored
      This fix ensures that
      * A HelloRequest is retransmitted if not responded by a ClientHello
      * The HelloRequest "consumes" the sequence number 0. The subsequent
      ServerHello uses the sequence number 1.
      * The client also expects the sequence number of the ServerHello to
      be 1 if a HelloRequest was received earlier.
      This patch fixes the RFC violation.
      (cherry picked from commit b62f4daa)
      
      Conflicts:
      
      	ssl/d1_pkt.c
      6f87807e