- Jul 18, 2010
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
- Jun 01, 2010
-
-
Dr. Stephen Henson authored
-
- May 05, 2010
-
-
Andy Polyakov authored
be done, it's definitely not the way to do it. So far answer to the question was to ./config -Wa,--noexecstack (adopted by RedHat).
-
Ben Laurie authored
-
- Apr 15, 2010
-
-
Dr. Stephen Henson authored
-
- Apr 07, 2010
-
-
Dr. Stephen Henson authored
directly by SSL/TLS SHA2 certificates are becoming more common and applications that only call SSL_library_init() and not OpenSSL_add_all_alrgorithms() will fail when verifying certificates. Update docs.
-
- Mar 25, 2010
-
-
Bodo Möller authored
Also, add missing CHANGES entry for CVE-2009-3245 (code changes submitted to this branch on 23 Feb 2010), and further harmonize this version of CHANGES with the versions in the current branches.
-
- Mar 14, 2010
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
- Mar 12, 2010
-
-
Mark J. Cox authored
security relevent we'd better list it.
-
- Mar 11, 2010
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
- Mar 08, 2010
-
-
Dr. Stephen Henson authored
requests. Add new ASN1 signature initialisation function to handle this case.
-
- Mar 06, 2010
-
-
Dr. Stephen Henson authored
Uses ASN1 module in Martin Kaiser's PSS patch.
-
Dr. Stephen Henson authored
now print out signatures instead of the standard hex dump. More complex signatures (e.g. PSS) can print out more meaningful information. Sample DSA version included that prints out the signature parameters r, s. [Note EVP_PKEY_ASN1_METHOD is an application opaque structure so adding new fields in the middle has no compatibility issues]
-
- Mar 03, 2010
-
-
Dr. Stephen Henson authored
Fix for CVE-2010-0433 where some kerberos enabled versions of OpenSSL could be crashed if the relevant tables were not present (e.g. chrooted).
-
- Feb 26, 2010
-
-
Dr. Stephen Henson authored
-
- Feb 25, 2010
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
certificate is explicitly trusted (using -addtrust option to x509 utility for example) the verification is sucessful even if the chain is not complete.
-
- Feb 19, 2010
-
-
Bodo Möller authored
-
- Feb 17, 2010
-
-
Dr. Stephen Henson authored
initial connection to unpatched servers. There are no additional security concerns in doing this as clients don't see renegotiation during an attack anyway.
-
Dr. Stephen Henson authored
Submitted by: James Baker <jbaker@tableausoftware.com> et al. Workaround for slow Heap32Next on some versions of Windows.
-
- Feb 12, 2010
-
-
Dr. Stephen Henson authored
-
- Feb 08, 2010
-
-
Dr. Stephen Henson authored
-
- Feb 07, 2010
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
an EVP_CIPHER_CTX structure which may have problems with external ENGINEs who need to duplicate internal handles etc.
-
- Jan 29, 2010
-
-
Dr. Stephen Henson authored
-
- Jan 28, 2010
-
-
Dr. Stephen Henson authored
-
- Jan 27, 2010
-
-
Dr. Stephen Henson authored
-
- Jan 26, 2010
-
-
Dr. Stephen Henson authored
Submitted by: steve@openssl.org More robust fix and workaround for PR#1949. Don't try to work out if there is any write pending data as this can be unreliable: always flush.
-
Dr. Stephen Henson authored
-
- Jan 22, 2010
-
-
Dr. Stephen Henson authored
-
- Jan 13, 2010
-
-
Dr. Stephen Henson authored
Although it will be many years before TLS v2.0 or later appears old versions of servers have a habit of hanging around for a considerable time so best if we handle this properly now.
-
Dr. Stephen Henson authored
stops applications that call CRYPTO_free_all_ex_data() prematurely leaking memory.
-
- Jan 12, 2010
-
-
Dr. Stephen Henson authored
Submitted by: Willy Weisz <weisz@vcpc.univie.ac.at> Add options to output hash using older algorithm compatible with OpenSSL versions before 1.0.0
-
- Jan 06, 2010
-
-
Dr. Stephen Henson authored
1. Add provisional SCSV value. 2. Don't send SCSV and RI at same time. 3. Fatal error is SCSV received when renegotiating.
-
- Dec 31, 2009
-
-
Dr. Stephen Henson authored
used compression algorithms in client hello (a legacy from when the compression algorithm wasn't serialized with SSL_SESSION).
-
Dr. Stephen Henson authored
-