- Jul 04, 2014
-
-
Dr. Stephen Henson authored
(cherry picked from commit 55707a36)
-
- Jul 03, 2014
-
-
Rich Salz authored
-
- Jul 02, 2014
-
-
Andy Polyakov authored
PR: #3397 (cherry picked from commit eca441b2)
-
Dr. Stephen Henson authored
-
Matt Smart authored
ERR_get_error(3) references the non-existent ERR_get_last_error_line_data instead of the one that does exist, ERR_peek_last_error_line_data. PR#3283 (cherry picked from commit 5cc99c6c)
-
Thijs Alkemade authored
(cherry picked from commit 7cb472bd)
-
Geoff Thorpe authored
Gets rid of this; defined(@array) is deprecated at ../util/mkerr.pl line 792. (Maybe you should just omit the defined()?) defined(@array) is deprecated at ../util/mkerr.pl line 800. (Maybe you should just omit the defined()?) Signed-off-by: Geoff Thorpe <geoff@openssl.org> (cherry picked from commit 647f360e)
-
Dr. Stephen Henson authored
Primitive encodings shouldn't use indefinite length constructed form. PR#2438 (partial). (cherry picked from commit 398e99fe)
-
- Jul 01, 2014
-
-
Ben Laurie authored
-
- Jun 30, 2014
-
-
Dr. Stephen Henson authored
Internal pointers in CCM, GCM and XTS contexts should either be NULL or set to point to the appropriate key schedule. This needs to be adjusted when copying contexts. (cherry picked from commit c2fd5d79)
-
- Jun 29, 2014
-
-
Jeffrey Walton authored
IN parameter. Under the old docs, the only thing stated was "at most EVP_PKEY_size(pkey) bytes will be written". It was kind of misleading since it appears EVP_PKEY_size(pkey) WILL be written regardless of the signature's buffer size. (cherry picked from commit 6e6ba36d)
-
Dr. Stephen Henson authored
PR#2531 (cherry picked from commit 44724bee)
-
Ken Ballou authored
PR#3173 (cherry picked from commit 76ed5a42)
-
Dr. Stephen Henson authored
If CSR verify fails in ca utility print out error messages. Otherwise some errors give misleading output: for example if the key size exceeds the library limit. PR#2875 (cherry picked from commit a30bdb55)
-
Dr. Stephen Henson authored
(cherry picked from commit 7ae6a4b6)
-
- Jun 28, 2014
-
-
Dr. Stephen Henson authored
Update protocols supported and note that SSLv2 is effectively disabled by default. PR#3184 (cherry picked from commit 1b13a4f38dfc385d5e776f6b3e06c5795874cf9b)
-
Dr. Stephen Henson authored
PR#3107 (cherry picked from commit 7c206db9)
-
- Jun 27, 2014
-
-
Dr. Stephen Henson authored
Some state strings were erronously not compiled when no-ssl2 was set. PR#3295 (cherry picked from commit 0518a3e1)
-
yogesh nagarkar authored
PR#3141 (cherry picked from commit d183545d)
-
Andreas Westfeld authored
(cherry picked from commit d1d4382d)
-
Ken Ballou authored
PR#3174 (cherry picked from commit fd331c0bb9b557903dd2ce88398570a3327b5ef0)
-
Dr. Stephen Henson authored
In EVP_PBE_alg_add don't use the underlying NID for the cipher as it may have a non-standard key size. PR#3206 (cherry picked from commit efb7caef637a1de8468ca109efd355a9d0e73a45)
-
Dr. Stephen Henson authored
PR#3014 (cherry picked from commit 11da66f8)
-
Tom Greenslade authored
PR#2783 (cherry picked from commit b36f35cd)
-
Tomas Mraz authored
PR#3374 (cherry picked from commit 0436369f)
-
Jeffrey Walton authored
Document that the certificate passed to SSL_CTX_add_extra_chain_cert() should not be freed by the application. PR#3409 (cherry picked from commit 0535c2d6) Add restrictions section present in other branches. Conflicts: doc/ssl/SSL_CTX_add_extra_chain_cert.pod
-
Dr. Stephen Henson authored
(cherry picked from commit 7be6b27a)
-
Dr. Stephen Henson authored
PR#3403
-
Dr. Stephen Henson authored
OIDs with one component don't have an encoding. PR#2556 (Bug#1)
-
- Jun 26, 2014
-
-
Huzaifa Sidhpurwala authored
PR#3410 (cherry picked from commit e14e764c0d5d469da63d0819c6ffc0e1e9e7f0bb)
-
Jenny Yung authored
PR#3399.
-
- Jun 22, 2014
-
-
Miod Vallat authored
In the ssl_cipher_get_evp() function, fix off-by-one errors in index validation before accessing arrays. Bug discovered and fixed by Miod Vallat from the OpenBSD team. PR#3375
-
Matt Caswell authored
This reverts commit 29411a0c. Incorrect attribution.
-
- Jun 14, 2014
-
-
Dr. Stephen Henson authored
Allow CCS after finished has been sent by client: at this point keys have been correctly set up so it is OK to accept CCS from server. Without this renegotiation can sometimes fail. PR#3400 (cherry picked from commit 99cd6a91fcb0931feaebbb4832681d40a66fad41)
-
- Jun 13, 2014
-
-
Matt Caswell authored
Based on an original patch by Joel Sing (OpenBSD) who also originally identified the issue.
-
Matt Caswell authored
This reverts commit 9ab788aa. Missing attribution
-
- Jun 12, 2014
-
-
Kurt Cancemi authored
In the ssl_cipher_get_evp() function, fix off-by-one errors in index validation before accessing arrays. PR#3375
-
- Jun 11, 2014
-
-
Dr. Stephen Henson authored
(cherry picked from commit 7239a09c7b5757ed8d0e9869f3e9b03c0e11f4d1)
-