- May 21, 2014
-
-
Dr. Stephen Henson authored
PR#3357 (cherry picked from commit ca3ffd9670f2b589bf8cc04923f953e06d6fbc58) Conflicts: doc/apps/smime.pod
-
- May 15, 2014
-
-
Matt Caswell authored
-
- May 14, 2014
-
-
Jeffrey Walton authored
-
Jeffrey Walton authored
-
Michal Bozon authored
-
- May 12, 2014
-
-
Kurt Roeckx authored
-
- May 11, 2014
-
-
Günther Noack authored
PR: 3317
-
Viktor Dukhovni authored
-
Tim Hudson authored
-
- May 08, 2014
-
-
Dr. Stephen Henson authored
If the key type does not match any CMS recipient type return an error instead of using a random key (MMA mitigation). This does not leak any useful information to an attacker. PR#3348 (cherry picked from commit 83a3182e0560f76548f4378325393461f6275493)
-
- May 06, 2014
-
-
Geoff Thorpe authored
This patch resolves RT ticket #2608. Thanks to Robert Dugal for originally spotting this, and to David Ramos for noticing that the ball had been dropped. Signed-off-by: Geoff Thorpe <geoff@openssl.org>
-
Geoff Thorpe authored
The lazy-initialisation of BN_MONT_CTX was serialising all threads, as noted by Daniel Sands and co at Sandia. This was to handle the case that 2 or more threads race to lazy-init the same context, but stunted all scalability in the case where 2 or more threads are doing unrelated things! We favour the latter case by punishing the former. The init work gets done by each thread that finds the context to be uninitialised, and we then lock the "set" logic after that work is done - the winning thread's work gets used, the losing threads throw away what they've done. Signed-off-by: Geoff Thorpe <geoff@openssl.org>
-
Dr. Stephen Henson authored
PR#3289 PR#3345 (cherry picked from commit 3ba1e406)
-
Dr. Stephen Henson authored
(cherry picked from commit 9c5d953a)
-
- Apr 24, 2014
-
-
Steve Marquess authored
(cherry picked from commit 351f0a124bffaa94d2a8abdec2e7dde5ae9c457d)
-
- Apr 11, 2014
-
-
Dr. Stephen Henson authored
(cherry picked from commit 3143a332)
-
- Apr 09, 2014
-
-
Dr. Stephen Henson authored
Keep copy of any host, path and port values allocated by OCSP_parse_url and free as necessary. (cherry picked from commit 5219d3dd)
-
- Apr 04, 2014
-
-
Dr. Stephen Henson authored
(cherry picked from commit 6cc00684)
-
Dr. Stephen Henson authored
Use bufsiz - 1 not BUFSIZ - 1 when prompting for a password in the openssl utility. Thanks to Rob Mackinnon, Leviathan Security for reporting this issue. (cherry picked from commit 7ba08a4d)
-
- Apr 02, 2014
-
-
Eric Young authored
A short PEM encoded sequence if passed to the BIO, and the file had 2 \n following would fail. PR#3289 (cherry picked from commit 10378fb5)
-
- Mar 27, 2014
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
Use a previously unused value as we will be updating multiple released branches. (cherry picked from commit 0737acd2)
-
mancha authored
Fix for the attack described in the paper "Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack" by Yuval Yarom and Naomi Benger. Details can be obtained from: http://eprint.iacr.org/2014/140 Thanks to Yuval Yarom and Naomi Benger for discovering this flaw and to Yuval Yarom for supplying a fix. Thanks for mancha for backporting the fix to OpenSSL 0.9.8 branch.
-
mancha authored
Fix OpenSSL 0.9.8 alert handling. PR#3038
-
- Feb 15, 2014
-
-
Dr. Stephen Henson authored
(cherry picked from commit 5a7652c3)
-
- Jan 29, 2014
-
-
Dr. Stephen Henson authored
Remove reference to ERR_TXT_MALLOCED in the error library as that is only used internally. Indicate that returned error data must not be freed. (cherry picked from commit f2d678e6)
-
- Jan 10, 2014
-
-
Dr. Stephen Henson authored
(cherry picked from commit 080ae684)
-
- Jan 04, 2014
-
-
Dr. Stephen Henson authored
The flag SSL_OP_MSIE_SSLV2_RSA_PADDING hasn't done anything since OpenSSL 0.9.7h but deleting it will break source compatibility with any software that references it. Restore it but #define to zero. (cherry picked from commit b17d6b8d)
-
- Dec 10, 2013
-
-
Dr. Stephen Henson authored
-
- Dec 09, 2013
-
-
Dr. Stephen Henson authored
-
- Nov 27, 2013
-
-
Dr. Stephen Henson authored
-
- Nov 21, 2013
-
-
Dr. Stephen Henson authored
-
- Oct 04, 2013
-
-
Rob Stradling authored
-
Rob Stradling authored
-
Rob Stradling authored
-
Rob Stradling authored
-
Rob Stradling authored
-
Rob Stradling authored
-
Rob Stradling authored
OS X 10.8..10.8.3 has broken support for ECDHE-ECDSA ciphers.
-