- Mar 18, 2014
-
-
Piotr Sikora authored
-
- Mar 12, 2014
-
-
Dr. Stephen Henson authored
Use a previously unused value as we will be updating multiple released branches. (cherry picked from commit 0737acd2a8cc688902b5151cab5dc6737b82fb96)
-
Dr. Stephen Henson authored
Fix for the attack described in the paper "Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack" by Yuval Yarom and Naomi Benger. Details can be obtained from: http://eprint.iacr.org/2014/140 Thanks to Yuval Yarom and Naomi Benger for discovering this flaw and to Yuval Yarom for supplying a fix. (cherry picked from commit 2198be3483259de374f91e57d247d0fc667aef29) Conflicts: CHANGES
-
- Mar 10, 2014
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
- Mar 07, 2014
-
-
Dr. Stephen Henson authored
(cherry picked from commit 7a3e67f029969620966b8a627b8485d83692cca5)
-
Andy Polyakov authored
PR: 3275
-
Andy Polyakov authored
The problem is that OpenSSH calls EVP_Cipher, which is not as protective as EVP_CipherUpdate. Formally speaking we ought to do more checks in *_cipher methods, including rejecting lengths not divisible by block size (unless ciphertext stealing is in place). But for now I implement check for zero length in low-level based on precedent. PR: 3087, 2775
-
- Mar 06, 2014
-
-
Andy Polyakov authored
-
Andy Polyakov authored
Submitted by: Roumen Petrov
-
Andy Polyakov authored
Submitted by: Roumen Petrov
-
- Mar 03, 2014
-
-
Dr. Stephen Henson authored
(cherry picked from commit bdfc0e284c89dd5781259cc19aa264aded538492)
-
- Mar 01, 2014
-
-
Dr. Stephen Henson authored
Add option to set an alternative to the default hmacWithSHA1 PRF for PKCS#8 private key encryptions. This is used automatically by PKCS8_encrypt if the nid specified is a PRF. Add option to pkcs8 utility. Update docs. (cherry picked from commit b60272b01fcb4f69201b3e1659b4f7e9e9298dfb)
-
Dr. Stephen Henson authored
(cherry picked from commit 124d218889dfca33d277404612f1319afe04107e)
-
Dr. Stephen Henson authored
Although the memory allocated by compression methods is fixed and cannot grow over time it can cause warnings in some leak checking tools. The function SSL_COMP_free_compression_methods() will free and zero the list of supported compression methods. This should *only* be called in a single threaded context when an application is shutting down to avoid interfering with existing contexts attempting to look up compression methods. (cherry picked from commit 976c58302b13d085edb3ab822f5eac4b2f1bff95)
-
- Feb 28, 2014
-
-
Andy Polyakov authored
PR: 3271
-
- Feb 27, 2014
-
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
- Feb 26, 2014
-
-
Rob Stradling authored
-
Dr. Stephen Henson authored
(cherry picked from commit 3eddd1706a30cdf3dc9278692d8ee9038eac8a0d)
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
- Feb 25, 2014
-
-
Andy Polyakov authored
PR: 3201
-
Andy Polyakov authored
-
Dr. Stephen Henson authored
(cherry picked from commit 3678161d)
-
Dr. Stephen Henson authored
Not all platforms define BN_ULLONG. Define SCTS_TIMESTAMP as a type which should work on all platforms. (cherry picked from commit 66344167)
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
Windows 8 SDKs complain that GetVersion() is deprecated. We only use GetVersion like this: (GetVersion() < 0x80000000) which checks if the Windows version is NT based. Use a macro check_winnt() which uses GetVersion() on older SDK versions and true otherwise.
-
Rob Stradling authored
-
- Feb 24, 2014
-
-
Andy Polyakov authored
Allegedly formwarding to NUL: sometimes creates NUL file in file system. PR: 3250
-
Andy Polyakov authored
PR: 3251 Suggested by: Thorsten Schning
-
Andy Polyakov authored
when adding duplicates in add_cert_dir. PR: 3261 Reported by: Marian Done
-
Andy Polyakov authored
-
- Feb 23, 2014
-
-
Dr. Stephen Henson authored
When setting the current certificate check that it has a corresponding private key.
-
Dr. Stephen Henson authored
New flags to build certificate chains. The can be used to rearrange the chain so all an application needs to do is add all certificates in arbitrary order and then build the chain to check and correct them. Add verify error code when building chain. Update docs.
-
- Feb 21, 2014
-
-
Dr. Stephen Henson authored
-