Skip to content
  1. Nov 16, 1999
  2. Nov 15, 1999
    • Mark J. Cox's avatar
      This corrects the reference count handling in SSL_get_session. · b7cfcfb7
      Mark J. Cox authored
      Previously, the returned SSL_SESSION didn't have its reference count
      incremented so the SSL_SESSION could be freed at any time causing
      seg-faults if the pointer was subsequently used. Code that uses
      SSL_get_session must now make a corresponding SSL_SESSION_free() call when
      it is done to avoid memory leaks (or blocked up session caches).
      
      Submitted By: Geoff Thorpe <geoff@eu.c2.net>
      b7cfcfb7
  3. Nov 14, 1999
  4. Nov 12, 1999
  5. Nov 11, 1999
  6. Nov 10, 1999
  7. Nov 08, 1999
  8. Nov 04, 1999
  9. Nov 03, 1999
  10. Oct 29, 1999
  11. Oct 27, 1999
    • Dr. Stephen Henson's avatar
      Continued multibyte character support. · 74400f73
      Dr. Stephen Henson authored
      Add a bunch of functions to simplify the creation of X509_NAME structures.
      
      Change the X509_NAME_entry_add stuff in req/ca so it no longer uses
      X509_NAME_entry_count(): passing -1 has the same effect.
      74400f73
  12. Oct 26, 1999
  13. Oct 21, 1999
  14. Oct 20, 1999
  15. Oct 13, 1999
  16. Oct 11, 1999
  17. Oct 09, 1999
  18. Oct 07, 1999
  19. Oct 05, 1999
  20. Oct 04, 1999
  21. Oct 02, 1999
  22. Sep 24, 1999
  23. Sep 21, 1999
  24. Sep 20, 1999
  25. Sep 18, 1999
  26. Sep 10, 1999
  27. Sep 08, 1999
    • Bodo Möller's avatar
    • Dr. Stephen Henson's avatar
      This is preliminary support for an "RSA null" cipher. Unfortunately when · 4a61a64f
      Dr. Stephen Henson authored
      OpenSSL is compiled with NO_RSA, no RSA operations can be used: including
      key generation storage and display of RSA keys. Since these operations are
      not covered by the RSA patent (my understanding is it only covers encrypt,
      decrypt, sign and verify) they can be included: this is an often requested
      feature, attempts to use the patented operations return an error code.
      
      This is enabled by setting RSA_NULL. This means that if a particular application
      has its own legal US RSA implementation then it can use that instead by setting
      it as the default RSA method.
      
      Still experimental and needs some fiddling of the other libraries so they have
      some options that don't attempt to use RSA if it isn't allowed.
      4a61a64f