Skip to content
  1. Jul 30, 2008
  2. Jul 03, 2008
  3. Jun 26, 2008
  4. Jun 23, 2008
  5. Jun 09, 2008
  6. Jun 05, 2008
  7. Jun 04, 2008
  8. Jun 03, 2008
  9. Jun 01, 2008
  10. May 28, 2008
    • Bodo Möller's avatar
      sync with 0.9.8 branch · 2cd81830
      Bodo Möller authored
      2cd81830
    • Bodo Möller's avatar
      From HEAD: · e194fe8f
      Bodo Möller authored
      Fix flaw if 'Server Key exchange message' is omitted from a TLS
      handshake which could lead to a cilent crash as found using the
      Codenomicon TLS test suite (CVE-2008-1672)
      
      Reviewed by: openssl-security@openssl.org
      
      Obtained from: mark@awe.com
      e194fe8f
    • Bodo Möller's avatar
      From HEAD: · 40a70628
      Bodo Möller authored
      Fix double-free in TLS server name extensions which could lead to a remote
      crash found by Codenomicon TLS test suite (CVE-2008-0891)
      
      Reviewed by: openssl-security@openssl.org
      
      Obtained from: jorton@redhat.com
      40a70628
  11. May 26, 2008
  12. May 23, 2008
  13. May 20, 2008
  14. May 19, 2008
  15. Apr 30, 2008
  16. Apr 28, 2008
  17. Apr 27, 2008
  18. Apr 02, 2008
  19. Mar 28, 2008
    • Dr. Stephen Henson's avatar
      eb9d8d8c
    • Geoff Thorpe's avatar
      There was a need to support thread ID types that couldn't be reliably cast · f7ccba3e
      Geoff Thorpe authored
      to 'unsigned long' (ie. odd platforms/compilers), so a pointer-typed
      version was added but it required portable code to check *both* modes to
      determine equality. This commit maintains the availability of both thread
      ID types, but deprecates the type-specific accessor APIs that invoke the
      callbacks - instead a single type-independent API is used.  This simplifies
      software that calls into this interface, and should also make it less
      error-prone - as forgetting to call and compare *both* thread ID accessors
      could have led to hard-to-debug/infrequent bugs (that might only affect
      certain platforms or thread implementations). As the CHANGES note says,
      there were corresponding deprecations and replacements in the
      thread-related functions for BN_BLINDING and ERR too.
      f7ccba3e
  20. Mar 15, 2008
  21. Mar 12, 2008
    • Dr. Stephen Henson's avatar
      And so it begins... · 8931b30d
      Dr. Stephen Henson authored
      Initial support for CMS.
      
      Add zlib compression BIO.
      
      Add AES key wrap implementation.
      
      Generalize S/MIME MIME code to support CMS and/or PKCS7.
      8931b30d
  22. Feb 27, 2008
  23. Jan 06, 2008
  24. Jan 03, 2008
  25. Oct 26, 2007
    • Dr. Stephen Henson's avatar
      1. Changes for s_client.c to make it return non-zero exit code in case · 0e1dba93
      Dr. Stephen Henson authored
      of handshake failure
      
      2. Changes to x509_certificate_type function (crypto/x509/x509type.c) to
      make it recognize GOST certificates as EVP_PKT_SIGN|EVP_PKT_EXCH
      (required for s3_srvr to accept GOST client certificates).
      
      3. Changes to EVP
      	- adding of function EVP_PKEY_CTX_get0_peerkey
      	- Make function EVP_PKEY_derive_set_peerkey work for context with
      	  ENCRYPT operation, because we use peerkey field in the context to
      	  pass non-ephemeral secret key to GOST encrypt operation.
      	- added EVP_PKEY_CTRL_SET_IV control command. It is really
      	  GOST-specific, but it is used in SSL code, so it has to go
      	  in some header file, available during libssl compilation
      
      4. Fix to HMAC to avoid call of OPENSSL_cleanse on undefined data
      
      5. Include des.h if KSSL_DEBUG is defined into some libssl files, to
        make debugging output which depends on constants defined there, work
        and other KSSL_DEBUG output fixes
      
      6. Declaration of real GOST ciphersuites, two authentication methods
         SSL_aGOST94 and SSL_aGOST2001 and one key exchange method SSL_kGOST
      
      7. Implementation  of these methods.
      
      8. Support for sending unsolicited serverhello extension if GOST
        ciphersuite is selected. It is require for interoperability with
        CryptoPro CSP 3.0 and 3.6 and controlled by
        SSL_OP_CRYPTOPRO_TLSEXT_BUG constant.
        This constant is added to SSL_OP_ALL, because it does nothing, if
        non-GOST ciphersuite is selected, and all implementation of GOST
        include compatibility with CryptoPro.
      
      9. Support for CertificateVerify message without length field. It is
         another CryptoPro bug, but support is made unconditional, because it
         does no harm for draft-conforming implementation.
      
      10. In tls1_mac extra copy of stream mac context is no more done.
        When I've written currently commited code I haven't read
        EVP_DigestSignFinal manual carefully enough and haven't noticed that
        it does an internal digest ctx copying.
      
      This implementation was tested against
      1. CryptoPro CSP 3.6 client and server
      2. Cryptopro CSP 3.0 server
      0e1dba93
  26. Oct 19, 2007
  27. Oct 13, 2007
  28. Oct 12, 2007
  29. Oct 01, 2007
  30. Sep 27, 2007
  31. Sep 26, 2007
  32. Sep 21, 2007
    • Bodo Möller's avatar
      Implement the Opaque PRF Input TLS extension · 761772d7
      Bodo Möller authored
      (draft-rescorla-tls-opaque-prf-input-00.txt), and do some cleanups and
      bugfixes on the way.  In particular, this fixes the buffer bounds
      checks in ssl_add_clienthello_tlsext() and in ssl_add_serverhello_tlsext().
      
      Note that the opaque PRF Input TLS extension is not compiled by default;
      see CHANGES.
      761772d7