- Aug 08, 2008
-
-
Dr. Stephen Henson authored
TODO: robustness checking on name forms.
-
- Aug 06, 2008
-
-
Geoff Thorpe authored
-
Geoff Thorpe authored
deprecate the original (numeric-only) scheme, and replace with the CRYPTO_THREADID object. This hides the platform-specifics and should reduce the possibility for programming errors (where failing to explicitly check both thread ID forms could create subtle, platform-specific bugs). Thanks to Bodo, for invaluable review and feedback.
-
Andy Polyakov authored
-
Andy Polyakov authored
8KB block, +60% on 1KB, +160% on 256B...
-
- Aug 05, 2008
-
-
Geoff Thorpe authored
-
Dr. Stephen Henson authored
-
- Aug 04, 2008
-
-
Bodo Möller authored
Also, get rid of compile-time switch OPENSSL_NO_RELEASE_BUFFERS because it was rather pointless (the new behavior has to be explicitly requested by setting SSL_MODE_RELEASE_BUFFERS anyway).
-
Dr. Stephen Henson authored
fields.
-
- Aug 02, 2008
-
-
Dr. Stephen Henson authored
-
- Aug 01, 2008
-
-
Lutz Jänicke authored
-
- Jul 30, 2008
-
-
Dr. Stephen Henson authored
Allow inibit any policy flag to be set in apps.
-
Dr. Stephen Henson authored
Inhibit any policy count should ignore self issued certificates. Require explicit policy is the number certificate before an explict policy is required.
-
- Jul 27, 2008
-
-
Ralf S. Engelschall authored
-
- Jul 22, 2008
-
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
- Jul 17, 2008
-
-
Bodo Möller authored
detection, or the probability for an erroneous RSA_R_SSLV3_ROLLBACK_ATTACK will be larger than necessary. PR: 1695
-
Andy Polyakov authored
PR: 1693 Submitted by: Stefan Neis
-
Andy Polyakov authored
PR: 1681
-
Andy Polyakov authored
-
- Jul 16, 2008
-
-
Bodo Möller authored
-
- Jul 15, 2008
-
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
- Jul 13, 2008
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
Ignore self issued certificates when checking path length constraints. Duplicate OIDs in policy tree in case they are allocated. Use anyPolicy from certificate cache and not current tree level.
-
- Jul 10, 2008
-
-
Geoff Thorpe authored
then the backslashes need escaping to avoid being treated as switches in the auto-generated strings in opensslconf.h. Perl users are welcome to suggest a less hokey way of doing this ...
-
- Jul 04, 2008
-
-
Dr. Stephen Henson authored
Conversion between void * and function pointer. Value computed not used. Signed/unsigned argument.
-
- Jul 03, 2008
-
-
Geoff Thorpe authored
version some time soon.
-
- Jun 26, 2008
-
-
Dr. Stephen Henson authored
-
- Jun 25, 2008
-
-
Dr. Stephen Henson authored
-
- Jun 23, 2008
-
-
Bodo Möller authored
Submitted by: Huang Ying Reviewed by: Douglas Stebila
-
- Jun 22, 2008
-
-
Dr. Stephen Henson authored
-
- Jun 21, 2008
-
-
Dr. Stephen Henson authored
-
- Jun 18, 2008
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-