Skip to content
  1. Jan 28, 2014
  2. Jan 23, 2014
  3. Jan 16, 2014
  4. Jan 11, 2014
  5. Jan 09, 2014
  6. Jan 08, 2014
  7. Jan 06, 2014
  8. Jan 04, 2014
    • Dr. Stephen Henson's avatar
      Restore SSL_OP_MSIE_SSLV2_RSA_PADDING · 25c9fa60
      Dr. Stephen Henson authored
      The flag SSL_OP_MSIE_SSLV2_RSA_PADDING hasn't done anything since OpenSSL
      0.9.7h but deleting it will break source compatibility with any software
      that references it. Restore it but #define to zero.
      (cherry picked from commit b17d6b8d)
      25c9fa60
  9. Jan 02, 2014
  10. Dec 22, 2013
  11. Dec 20, 2013
  12. Dec 19, 2013
    • Dr. Stephen Henson's avatar
      Use version in SSL_METHOD not SSL structure. · ca989269
      Dr. Stephen Henson authored
      When deciding whether to use TLS 1.2 PRF and record hash algorithms
      use the version number in the corresponding SSL_METHOD structure
      instead of the SSL structure. The SSL structure version is sometimes
      inaccurate. Note: OpenSSL 1.0.2 and later effectively do this already.
      (CVE-2013-6449)
      ca989269
  13. Dec 18, 2013
  14. Dec 10, 2013
  15. Dec 09, 2013
  16. Dec 08, 2013
    • Dr. Stephen Henson's avatar
      make update · 60df657b
      Dr. Stephen Henson authored
      60df657b
    • Dr. Stephen Henson's avatar
      Avoid multiple locks in FIPS mode. · 17a2d080
      Dr. Stephen Henson authored
      PR: 3176.
      
      In FIPS mode ssleay_rand_bytes is only used for PRNG seeding and is
      performed in either a single threaded context (when the PRNG is first
      initialised) or under a lock (reseeding). To avoid multiple locks disable
      use of CRYPTO_LOCK_RAND in FIPS mode in ssleay_rand_bytes.
      (cherry picked from commit 53142f72c9b9c9bad2f39ca6200a4f04f5c8001c)
      17a2d080
  17. Dec 03, 2013
  18. Nov 27, 2013
  19. Nov 12, 2013
  20. Nov 11, 2013
  21. Nov 10, 2013
  22. Nov 09, 2013