- Aug 13, 2008
-
-
Dr. Stephen Henson authored
and CRL signing keys.
-
- Aug 12, 2008
-
-
Dr. Stephen Henson authored
Delete X509_POLICY_REF code. Fix handling of invalid policy extensions to return the correct error. Add command line option to inhibit policy mappings.
-
- Aug 08, 2008
-
-
Dr. Stephen Henson authored
TODO: robustness checking on name forms.
-
- Aug 06, 2008
-
-
Geoff Thorpe authored
deprecate the original (numeric-only) scheme, and replace with the CRYPTO_THREADID object. This hides the platform-specifics and should reduce the possibility for programming errors (where failing to explicitly check both thread ID forms could create subtle, platform-specific bugs). Thanks to Bodo, for invaluable review and feedback.
-
- Jul 30, 2008
-
-
Dr. Stephen Henson authored
Allow inibit any policy flag to be set in apps.
-
- Jul 03, 2008
-
-
Geoff Thorpe authored
version some time soon.
-
- Jun 26, 2008
-
-
Dr. Stephen Henson authored
-
- Jun 23, 2008
-
-
Bodo Möller authored
Submitted by: Huang Ying Reviewed by: Douglas Stebila
-
- Jun 09, 2008
-
-
Dr. Stephen Henson authored
-
- Jun 05, 2008
-
-
Dr. Stephen Henson authored
-
- Jun 04, 2008
-
-
Ben Laurie authored
-
- Jun 03, 2008
-
-
Ben Laurie authored
-
- Jun 01, 2008
-
-
Dr. Stephen Henson authored
-
- May 28, 2008
-
-
Bodo Möller authored
-
Bodo Möller authored
Fix flaw if 'Server Key exchange message' is omitted from a TLS handshake which could lead to a cilent crash as found using the Codenomicon TLS test suite (CVE-2008-1672) Reviewed by: openssl-security@openssl.org Obtained from: mark@awe.com
-
Bodo Möller authored
Fix double-free in TLS server name extensions which could lead to a remote crash found by Codenomicon TLS test suite (CVE-2008-0891) Reviewed by: openssl-security@openssl.org Obtained from: jorton@redhat.com
-
- May 26, 2008
-
-
Ben Laurie authored
-
- May 23, 2008
-
-
Lutz Jänicke authored
PR: 1417, 1513 Submitted by: Erik de Castro Lopo <mle+openssl@mega-nerd.com>
-
Lutz Jänicke authored
from the OpenSSL distribution.
-
- May 20, 2008
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
- May 19, 2008
-
-
Dr. Stephen Henson authored
Submitted by: Ivan Nestlerode <inestlerode@us.ibm.com> Reviewed by: steve
-
Bodo Möller authored
ptr members. (So if the id_callback is bogus, we still have &errno.)
-
- Apr 30, 2008
-
-
Dr. Stephen Henson authored
-
- Apr 28, 2008
-
-
Geoff Thorpe authored
ticket #1668). PR: 1668 Submitted by: Ian Lister Reviewed by: Geoff Thorpe
-
- Apr 27, 2008
-
-
Geoff Thorpe authored
where they both use the same limb size. I've tweaked his patch slightly, so blame me if it breaks. Submitted by: Paul Sheer Reviewed by: Geoff Thorpe
-
- Apr 02, 2008
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
- Mar 28, 2008
-
-
Dr. Stephen Henson authored
-
Geoff Thorpe authored
to 'unsigned long' (ie. odd platforms/compilers), so a pointer-typed version was added but it required portable code to check *both* modes to determine equality. This commit maintains the availability of both thread ID types, but deprecates the type-specific accessor APIs that invoke the callbacks - instead a single type-independent API is used. This simplifies software that calls into this interface, and should also make it less error-prone - as forgetting to call and compare *both* thread ID accessors could have led to hard-to-debug/infrequent bugs (that might only affect certain platforms or thread implementations). As the CHANGES note says, there were corresponding deprecations and replacements in the thread-related functions for BN_BLINDING and ERR too.
-
- Mar 15, 2008
-
-
Dr. Stephen Henson authored
Update CHANGES.
-
- Mar 12, 2008
-
-
Dr. Stephen Henson authored
Initial support for CMS. Add zlib compression BIO. Add AES key wrap implementation. Generalize S/MIME MIME code to support CMS and/or PKCS7.
-
- Feb 27, 2008
-
-
Bodo Möller authored
-
- Jan 06, 2008
-
-
Dr. Stephen Henson authored
(via top level Makefile) into mk1mf builds. This avoids the need to duplicate the CFLAG handling and can auto build assembly language source files from perl scripts. Extend VC-WIN32 Configure entry to include new options.
-
- Jan 03, 2008
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
Submitted by: Guenter Knauf <eflash@gmx.net>
-
- Oct 26, 2007
-
-
Dr. Stephen Henson authored
of handshake failure 2. Changes to x509_certificate_type function (crypto/x509/x509type.c) to make it recognize GOST certificates as EVP_PKT_SIGN|EVP_PKT_EXCH (required for s3_srvr to accept GOST client certificates). 3. Changes to EVP - adding of function EVP_PKEY_CTX_get0_peerkey - Make function EVP_PKEY_derive_set_peerkey work for context with ENCRYPT operation, because we use peerkey field in the context to pass non-ephemeral secret key to GOST encrypt operation. - added EVP_PKEY_CTRL_SET_IV control command. It is really GOST-specific, but it is used in SSL code, so it has to go in some header file, available during libssl compilation 4. Fix to HMAC to avoid call of OPENSSL_cleanse on undefined data 5. Include des.h if KSSL_DEBUG is defined into some libssl files, to make debugging output which depends on constants defined there, work and other KSSL_DEBUG output fixes 6. Declaration of real GOST ciphersuites, two authentication methods SSL_aGOST94 and SSL_aGOST2001 and one key exchange method SSL_kGOST 7. Implementation of these methods. 8. Support for sending unsolicited serverhello extension if GOST ciphersuite is selected. It is require for interoperability with CryptoPro CSP 3.0 and 3.6 and controlled by SSL_OP_CRYPTOPRO_TLSEXT_BUG constant. This constant is added to SSL_OP_ALL, because it does nothing, if non-GOST ciphersuite is selected, and all implementation of GOST include compatibility with CryptoPro. 9. Support for CertificateVerify message without length field. It is another CryptoPro bug, but support is made unconditional, because it does no harm for draft-conforming implementation. 10. In tls1_mac extra copy of stream mac context is no more done. When I've written currently commited code I haven't read EVP_DigestSignFinal manual carefully enough and haven't noticed that it does an internal digest ctx copying. This implementation was tested against 1. CryptoPro CSP 3.6 client and server 2. Cryptopro CSP 3.0 server
-
- Oct 19, 2007
-
-
Lutz Jänicke authored
-
- Oct 13, 2007
-
-
Andy Polyakov authored
-
- Oct 12, 2007
-
-
Dr. Stephen Henson authored
-