- May 21, 2014
-
-
Ben Laurie authored
-
Viktor Dukhovni authored
Fixes to host checking wild card support and add support for setting host checking flags when verifying a certificate chain. (cherry picked from commit 397a8e74)
-
Dr. Stephen Henson authored
Use triple DES for certificate encryption if no-rc2 is specified. PR#3357
-
Dr. Stephen Henson authored
PR#3357 (cherry picked from commit ca3ffd9670f2b589bf8cc04923f953e06d6fbc58)
-
- May 20, 2014
-
-
Ben Laurie authored
-
Ben Laurie authored
-
Dr. Stephen Henson authored
(cherry picked from commit dcca7b13)
-
Dr. Stephen Henson authored
(cherry picked from commit 6db14dbc)
-
- May 19, 2014
-
-
Janpopan authored
-
Ben Laurie authored
-
- May 18, 2014
-
-
Mike Bland authored
Regression test against CVE-2014-0160 (Heartbleed). More info: http://mike-bland.com/tags/heartbleed.html (based on commit 35cb55988b75573105eefd00d27d0138eebe40b1)
-
- May 15, 2014
-
-
Matt Caswell authored
Moved note about lack of support for AEAD modes out of BUGS section to SUPPORTED CIPHERS section (bug has been fixed, but still no support for AEAD)
-
Dr. Stephen Henson authored
(cherry picked from commit 09184dddead165901700b31eb39d540ba30f93c5)
-
- May 14, 2014
-
-
Jeffrey Walton authored
-
Jeffrey Walton authored
-
Michal Bozon authored
-
- May 12, 2014
-
-
Mike Frysinger authored
various link settings. PR#3332
-
Kurt Roeckx authored
-
Jean-Paul Calderone authored
-
Serguei E. Leontiev authored
Replace manual ASN.1 decoder with ASN1_get object. This will decode the tag and length properly and check against it does not exceed the supplied buffer length. PR#3335 (cherry picked from commit b0308dddd1cc6a8e1de803ef29ba6da25ee072c2)
-
- May 11, 2014
-
-
Matt Caswell authored
-
Kurt Roeckx authored
-
Martin Brejcha authored
PR: 3327
-
Günther Noack authored
PR: 3317
-
Viktor Dukhovni authored
-
Matt Caswell authored
-
Tim Hudson authored
-
- May 09, 2014
-
-
Dr. Stephen Henson authored
If the key type does not match any CMS recipient type return an error instead of using a random key (MMA mitigation). This does not leak any useful information to an attacker. PR#3348 (cherry picked from commit bd43b4cf778a53ffa5d77510ecd408a009dc00d2)
-
- May 08, 2014
-
-
Tim Hudson authored
-
Tim Hudson authored
-
- May 07, 2014
-
-
Tim Hudson authored
-
Matt Caswell authored
-
- May 06, 2014
-
-
Geoff Thorpe authored
Even though the meat of dso_vms.c is compiled out on non-VMS builds, the (pre-)compiler still traverses some of the macro handling. This trips up at least one non-VMS build configuration, so this commit makes the skip-VMS case more robust. Signed-off-by: Geoff Thorpe <geoff@openssl.org>
-
Geoff Thorpe authored
This patch resolves RT ticket #2608. Thanks to Robert Dugal for originally spotting this, and to David Ramos for noticing that the ball had been dropped. Signed-off-by: Geoff Thorpe <geoff@openssl.org>
-
Geoff Thorpe authored
The lazy-initialisation of BN_MONT_CTX was serialising all threads, as noted by Daniel Sands and co at Sandia. This was to handle the case that 2 or more threads race to lazy-init the same context, but stunted all scalability in the case where 2 or more threads are doing unrelated things! We favour the latter case by punishing the former. The init work gets done by each thread that finds the context to be uninitialised, and we then lock the "set" logic after that work is done - the winning thread's work gets used, the losing threads throw away what they've done. Signed-off-by: Geoff Thorpe <geoff@openssl.org>
-
Dr. Stephen Henson authored
PR#3289 PR#3345 (cherry picked from commit 3ba1e406)
-
Dr. Stephen Henson authored
(cherry picked from commit 546b1b43)
-
- May 05, 2014
-
-
Tim Hudson authored
-
- May 03, 2014
-
-
David Ramos authored
PR: 3338
-
- May 01, 2014
-
-
Jeff Trawick authored
RT: 3304
-