- Mar 01, 2010
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
- Feb 28, 2010
-
-
Ben Laurie authored
warnings hard to fix without major surgery).
-
Dr. Stephen Henson authored
-
- Feb 27, 2010
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
1.0.0. Original fix was on 2007-Mar-09 and had the log message: "Fix kerberos ciphersuite bugs introduced with PR:1336."
-
- Feb 26, 2010
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
CFB mode does *not* have to be a multiple of the block length and several other specifications (e.g. PKCS#11) do not require this.
-
Dr. Stephen Henson authored
-
- Feb 25, 2010
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
certificate is explicitly trusted (using -addtrust option to x509 utility for example) the verification is sucessful even if the chain is not complete.
-
Dr. Stephen Henson authored
allow setting of verify names in command line utilities and print out verify names in verify utility
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
as issuer and subject names. Although this is an incompatible change it should have little impact in pratice because self-issued certificates that are not self-signed are rarely encountered.
-
- Feb 24, 2010
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
- Feb 23, 2010
-
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Dr. Stephen Henson authored
X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT error codes were reversed in the verify application documentation.
-
Bodo Möller authored
(The CHANGES entry covers the change from PR #2111 as well, submitted by Martin Olsson.) Submitted by: Neel Mehta
-
- Feb 19, 2010
-
-
Bodo Möller authored
-
- Feb 18, 2010
-
-
Dr. Stephen Henson authored
-
- Feb 17, 2010
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
initial connection to unpatched servers. There are no additional security concerns in doing this as clients don't see renegotiation during an attack anyway.
-
Dr. Stephen Henson authored
Submitted by: James Baker <jbaker@tableausoftware.com> et al. Workaround for slow Heap32Next on some versions of Windows.
-
- Feb 16, 2010
-
-
Dr. Stephen Henson authored
Don't leave dangling pointers in GOST engine if calls fail.
-
Dr. Stephen Henson authored
Submitted by: Tomas Mraz <tmraz@redhat.com> Since SSLv2 doesn't support renegotiation at all don't reject it if legacy renegotiation isn't enabled. Also can now use SSL2 compatible client hello because RFC5746 supports it.
-
- Feb 15, 2010
-
-
Dr. Stephen Henson authored
should be the number of feedback bits expressed in bytes. For CFB1 mode set this to 1 by rounding up to the nearest multiple of 8.
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
Submitted by: "Noszticzius, Istvan" <inoszticzius@rightnow.com> Don't clear the output buffer: ciphers should correctly the same input and output buffers.
-
- Feb 12, 2010
-
-
Dr. Stephen Henson authored
-