Skip to main content
  • Home
  • login
  • Browse the archive

    swh mirror partner logo
swh logo
SoftwareHeritage
Software
Heritage
Mirror
Features
  • Search

  • Downloads

  • Save code now

  • Add forge now

  • Help


sort by:
RevisionAuthorDateMessageCommit Date
448e9b7 Dr. Stephen Henson28 January 2014, 15:35:16 UTCtypo (cherry picked from commit cb2182676bdf652070bc272a3896d957763a4324)28 January 2014, 15:36:15 UTC
2c4c986 Dr. Stephen Henson28 January 2014, 15:15:26 UTCFix demo comment: 0.9.9 never released. (cherry picked from commit 717cc8589540b95122a652dee68e6a75b6262d93)28 January 2014, 15:17:32 UTC
a99540a Dr. Stephen Henson28 January 2014, 15:10:27 UTCCheck i before r[i]. PR#3244 (cherry picked from commit 9614d2c676ffe74ce0c919d9e5c0d622a011cbed)28 January 2014, 15:14:47 UTC
9614ed6 Dr. Stephen Henson28 January 2014, 13:51:58 UTCAdd loaded dynamic ENGINEs to list. Always add a dynamically loaded ENGINE to list. Otherwise it can cause problems when multiply loaded, especially if it adds new public key methods. For all current engines we only want a single implementation anyway. (cherry picked from commit e933f91f50108a43c0198cdc63ecdfdbc77b4d0d)28 January 2014, 13:57:14 UTC
aabfee6 Dr. Stephen Henson25 January 2014, 23:20:34 UTCCertificate callback doc. (cherry picked from commit 46ab9bbd7fa610d775fe645dd0fe6d509c8dff3a)28 January 2014, 13:38:55 UTC
cee1d9e Dr. Stephen Henson27 January 2014, 14:59:46 UTCmake update27 January 2014, 14:59:46 UTC
285f7fb Dr. Stephen Henson26 January 2014, 00:51:09 UTCAdd cert callback retry test. (cherry picked from commit 3323314fc1c6d18e650a2de97f7cf9892ac92a60)27 January 2014, 14:41:38 UTC
ede90b1 Dr. Stephen Henson25 January 2014, 13:31:07 UTCSupport retries in certificate callback (cherry picked from commit 0ebc965b9ca4352e407bb7cfa65ac235942117f6) Conflicts: ssl/s3_srvr.c ssl/ssl3.h27 January 2014, 14:41:38 UTC
5e7329d Dr. Stephen Henson26 January 2014, 16:28:27 UTCCompare encodings in X509_cmp as well as hash. (cherry picked from commit ec492c8a5a1491949166c4b37df8666741180f4d)27 January 2014, 14:33:10 UTC
9f1979b Dr. Stephen Henson27 January 2014, 14:30:29 UTCNew function to set compression methods so they can be safely freed. (cherry picked from commit cbb67448277232c8403f96edad4931c4203e7746)27 January 2014, 14:32:44 UTC
3fcf327 Dr. Stephen Henson05 March 2010, 13:28:21 UTCAdd -engine_impl option to dgst which will use an implementation of an algorithm from the supplied engine instead of just the default one. (cherry picked from commit bb845ee044587a91589357a772a02cffb0ba4454)23 January 2014, 18:35:42 UTC
3f4742b Dr. Stephen Henson23 January 2014, 17:13:37 UTCmake update23 January 2014, 17:13:37 UTC
c4f01c5 Dr. Stephen Henson16 January 2014, 14:06:19 UTCAdd new function SSL_CTX_get_ssl_method(). Partial fix for PR#3183. (cherry picked from commit ba168244a14bbd056e502d7daa04cae4aabe9d0d)16 January 2014, 14:08:42 UTC
b7a8550 Kaspar Brand16 January 2014, 13:46:31 UTCOmit initial status request callback check. PR#3178 (cherry picked from commit d0b039d4a3a19b106cc2cb938125b86aca4974aa)16 January 2014, 13:48:23 UTC
e775891 Zoltan Arpadffy11 January 2014, 22:44:04 UTCVMS fixes11 January 2014, 22:44:04 UTC
ae6fbb5 Jeff Trawick10 January 2014, 23:00:50 UTCtypo (cherry picked from commit 5edce5685f26c1bb7854d4cdf291b9604fcc5dbf)10 January 2014, 23:02:46 UTC
f9c1f03 Jeff Trawick10 January 2014, 23:01:30 UTCtypo (cherry picked from commit 4b64e0cbdb563e13a6f7cd8631b31532c04f1234)10 January 2014, 23:02:20 UTC
50701af Dr. Stephen Henson09 January 2014, 22:47:22 UTCFix bug in X509_V_FLAG_IGNORE_CRITICAL CRL handling. (cherry picked from commit 8f4077ca69076cebaca51b7b666db1ed49e46b9e)09 January 2014, 22:53:50 UTC
1d6af3d Dr. Stephen Henson07 January 2014, 15:44:09 UTCupdate NEWS09 January 2014, 22:50:07 UTC
392fd8f Andy Polyakov09 January 2014, 12:44:59 UTCbn/asm/x86_64-mont5.pl: fix compilation error on Solaris. (cherry picked from commit eedab5241e32f9f185cfee23a0c67264d3e3ecf2)09 January 2014, 12:47:53 UTC
802db0f Dr. Stephen Henson07 January 2014, 15:38:15 UTCSync CHANGES07 January 2014, 15:41:11 UTC
2f97241 Dr. Stephen Henson07 January 2014, 15:37:35 UTCAdd fix for CVE-2013-435307 January 2014, 15:41:11 UTC
a05a2c6 Dr. Stephen Henson07 January 2014, 15:26:19 UTCUpdate NEWS.07 January 2014, 15:41:04 UTC
e341406 Andy Polyakov04 January 2014, 17:04:53 UTCsha/asm/sha256-armv4.pl: add NEON code path. (and shave off cycle even from integer-only code) (cherry picked from commit ad0d2579cf3a293a35a5b606afc5a97c71cf6ca7)04 January 2014, 17:06:36 UTC
acd9121 Andy Polyakov04 January 2014, 16:40:13 UTCaesni-sha1-x86_64.pl: harmonize [Atom-specific optimizations] with master branch.04 January 2014, 16:42:13 UTC
b17d6b8 Dr. Stephen Henson04 January 2014, 13:50:52 UTCRestore SSL_OP_MSIE_SSLV2_RSA_PADDING The flag SSL_OP_MSIE_SSLV2_RSA_PADDING hasn't done anything since OpenSSL 0.9.7h but deleting it will break source compatibility with any software that references it. Restore it but #define to zero.04 January 2014, 13:58:51 UTC
b9fa413 Dr. Stephen Henson03 January 2014, 22:38:03 UTCUse algorithm specific chains for certificates. Fix a limitation in SSL_CTX_use_certificate_chain_file(): use algorithm specific chains instead of the shared chain. Update docs. (cherry picked from commit a4339ea3ba045b7da038148f0d48ce25f2996971) Conflicts: CHANGES03 January 2014, 22:45:20 UTC
4abe148 Andy Polyakov03 January 2014, 20:52:49 UTCssl/t1_enc.c: optimize PRF (suggested by Intel). (cherry picked from commit e8b0dd57c0e9c53fd0708f0f458a7a2fd7a95c91)03 January 2014, 20:56:03 UTC
04d6940 Dr. Stephen Henson02 January 2014, 19:12:47 UTCupdate NEWS02 January 2014, 19:12:47 UTC
8511b5f Dr. Stephen Henson24 December 2013, 18:17:00 UTCDon't change version number if session established When sending an invalid version number alert don't change the version number to the client version if a session is already established. Thanks to Marek Majkowski for additional analysis of this issue. PR#3191 (cherry picked from commit b77b58a398c8b9b4113f3fb6b48e162a3b8d4527)02 January 2014, 15:07:51 UTC
546d676 Dr. Stephen Henson24 December 2013, 18:15:28 UTCUpdate curve list size.29 December 2013, 16:30:34 UTC
ccbb8d5 Andy Polyakov28 December 2013, 12:31:14 UTCsparcv9cap.c: omit random detection. PR: 3202 (cherry picked from commit 926725b3d7c1528f2dc116a48623c42264188277)28 December 2013, 12:32:45 UTC
d7d7e7b Andy Polyakov28 December 2013, 11:17:08 UTCARM assembly pack: make it work with older toolchain. (cherry picked from commit 2218c296b4981af6f2639bbd7eabfb89437fe776)28 December 2013, 11:18:11 UTC
80b6d97 Dr. Stephen Henson20 December 2013, 15:26:50 UTCFix DTLS retransmission from previous session. For DTLS we might need to retransmit messages from the previous session so keep a copy of write context in DTLS retransmission buffers instead of replacing it after sending CCS. CVE-2013-6450. (cherry picked from commit 34628967f1e65dc8f34e000f0f5518e21afbfc7b)20 December 2013, 23:25:41 UTC
ff64ab3 Dr. Stephen Henson20 December 2013, 15:12:26 UTCIgnore NULL parameter in EVP_MD_CTX_destroy. (cherry picked from commit a6c62f0c25a756c263a80ce52afbae888028e986)20 December 2013, 23:24:26 UTC
fc9c9e4 Andy Polyakov18 December 2013, 21:12:08 UTCsha1-x86_64.pl: harmonize Win64 SE handlers for SIMD code pathes. (and ensure stack alignment in the process) (cherry picked from commit fc0503a25cd638b93f7af04640c20042e0329b3b)18 December 2013, 21:57:14 UTC
68e6ac4 Andy Polyakov18 December 2013, 20:42:46 UTCevp/e_[aes|camellia].c: fix typo in CBC subroutine. It worked because it was never called. (cherry picked from commit e9c80e04c1a3b5a0de8e666155ab4ecb2697a77d)18 December 2013, 21:56:24 UTC
e34b7e9 Andy Polyakov18 December 2013, 20:27:35 UTCsha512.c: fullfull implicit API contract in SHA512_Transform. SHA512_Transform was initially added rather as tribute to tradition than for practucal reasons. But use was recently found in ssl/s3_cbc.c and it turned to be problematic on platforms that don't tolerate misasligned references to memory and lack assembly subroutine. (cherry picked from commit cdd1acd788020d2c525331da1712ada778f1373c)18 December 2013, 21:56:00 UTC
a32ba49 Dr. Stephen Henson14 December 2013, 13:55:48 UTCCheck EVP errors for handshake digests. Partial mitigation of PR#3200 (cherry picked from commit 0294b2be5f4c11e60620c0018674ff0e17b14238)18 December 2013, 13:27:15 UTC
3a0c715 Dr. Stephen Henson25 February 2010, 00:08:23 UTCverify parameter enumeration functions (cherry picked from commit 9b3d75706ef0114362f04665a3c745bfef59d023) Conflicts: crypto/x509/x509_vpm.c13 December 2013, 15:52:27 UTC
adc6bd7 Dr. Stephen Henson11 December 2013, 14:28:57 UTCAdd opaque ID structure. Move the IP, email and host checking fields from the public X509_VERIFY_PARAM structure into an opaque X509_VERIFY_PARAM_ID structure. By doing this the structure can be modified in future without risk of breaking any applications.13 December 2013, 15:36:31 UTC
8c6d8c2 Dr. Stephen Henson13 December 2013, 14:41:32 UTCBackport TLS padding extension from master.13 December 2013, 15:29:26 UTC
53a8f8c Dr. Stephen Henson13 December 2013, 14:05:32 UTCFix for partial chain notification. For consistency with other cases if we are performing partial chain verification with just one certificate notify the callback with ok==1.13 December 2013, 15:29:26 UTC
bf4863b Dr. Stephen Henson13 December 2013, 13:59:53 UTCVerify parameter retrieval functions. New functions to retrieve internal pointers to X509_VERIFY_PARAM for SSL_CTX and SSL structures.13 December 2013, 15:29:26 UTC
8f68678 Dr. Stephen Henson11 December 2013, 14:45:12 UTCDon't use rdrand engine as default unless explicitly requested.13 December 2013, 15:29:26 UTC
57c4e42 Dr. Stephen Henson10 December 2013, 12:52:27 UTCGet FIPS checking logic right. We need to lock when *not* in FIPS mode.10 December 2013, 12:52:27 UTC
ff672cf Dr. Stephen Henson10 December 2013, 00:10:41 UTCremove obsolete STATUS file10 December 2013, 00:10:41 UTC
d43b040 Dr. Stephen Henson10 December 2013, 00:01:42 UTCAdd release dates to NEWS10 December 2013, 00:08:33 UTC
422c8c3 Andy Polyakov09 December 2013, 22:53:42 UTCARM assembly pack: SHA update from master.09 December 2013, 22:53:42 UTC
b76310b Andy Polyakov09 December 2013, 22:44:45 UTCARM assembly pack: AES update from master (including bit-sliced module).09 December 2013, 22:44:45 UTC
c012f6e Andy Polyakov04 December 2013, 21:37:49 UTCbn/asm/armv4-mont.pl: add NEON code path. (cherry picked from commit d1671f4f1a39d938499c67efe5d4a14c34c09b31)09 December 2013, 21:46:29 UTC
cf6d559 Andy Polyakov09 December 2013, 21:40:53 UTCcrypto/bn/asm/x86_64-mont*.pl: update from master. Add MULX/AD*X code paths and optimize even original code path.09 December 2013, 21:40:53 UTC
3aa1b1c Andy Polyakov02 October 2013, 22:26:09 UTCx86_64-xlate.pl: fix jrcxz in nasm case. (cherry picked from commit 667053a2f3ad0788586f629f618d07b783bdde31)09 December 2013, 21:19:34 UTC
3dcae82 Andy Polyakov09 December 2013, 20:23:19 UTCx86_64-xlate.pl: minor update. (cherry picked from commit 41965a84c4bc0f6694fd17203920a6672e3fac7b)09 December 2013, 20:53:41 UTC
86b81ec Dr. Stephen Henson08 December 2013, 13:19:17 UTCupdate $default_depflags08 December 2013, 13:21:02 UTC
c43dc3d Dr. Stephen Henson04 December 2013, 13:39:04 UTCAvoid multiple locks in FIPS mode. PR: 3176. In FIPS mode ssleay_rand_bytes is only used for PRNG seeding and is performed in either a single threaded context (when the PRNG is first initialised) or under a lock (reseeding). To avoid multiple locks disable use of CRYPTO_LOCK_RAND in FIPS mode in ssleay_rand_bytes.08 December 2013, 13:21:02 UTC
e5eab8a Andy Polyakov03 December 2013, 22:59:55 UTCbn/asm/x86_64-mont5.pl: comply with Win64 ABI. PR: 3189 Submitted by: Oscar Ciurana (cherry picked from commit c5d5f5bd0fe8b2313bec844c0f80f3d49562bfa8)03 December 2013, 23:02:18 UTC
7bab6eb Andy Polyakov03 December 2013, 21:28:48 UTCcrypto/bn/asm/rsaz-x86_64.pl: make it work on Win64. (cherry picked from commit 8bd7ca99961f341ce2070373e86f22505aed2b2a)03 December 2013, 21:30:00 UTC
87d9526 Andy Polyakov03 December 2013, 21:05:17 UTCcrypto/bn/rsaz*: fix licensing note. rsaz_exp.c: harmonize line terminating; asm/rsaz-*.pl: minor optimizations. asm/rsaz-x86_64.pl: sync from master. (cherry picked from commit 31ed9a21315c571db443c68e4f618ecb51c631f9)03 December 2013, 21:17:55 UTC
36982f0 Andy Polyakov03 December 2013, 08:43:06 UTCbn/asm/rsaz-x86_64.pl: fix prototype. (cherry picked from commit 6efef384c6f649399dcc837825a9ca5a37069733)03 December 2013, 08:44:24 UTC
c97ec56 Dr. Stephen Henson01 December 2013, 23:30:21 UTCFix warning.01 December 2013, 23:30:21 UTC
fdb0d5d Dr. Stephen Henson01 December 2013, 23:29:40 UTCChange header order to pick up OPENSSL_SYS_WIN3201 December 2013, 23:29:40 UTC
81b6dfe Dr. Stephen Henson01 December 2013, 23:12:27 UTCRecongnise no-dane and no-libunbound01 December 2013, 23:12:27 UTC
bc35b8e Dr. Stephen Henson01 December 2013, 23:09:44 UTCmake update01 December 2013, 23:09:44 UTC
6859f3f Dr. Stephen Henson01 December 2013, 23:08:13 UTCFix warnings.01 December 2013, 23:08:13 UTC
8b2d5cc Dr. Stephen Henson01 December 2013, 23:07:18 UTCWIN32 fixes.01 December 2013, 23:07:18 UTC
74184b6 Dr. Stephen Henson01 December 2013, 23:06:33 UTCRSAX no longer compiled.01 December 2013, 23:06:33 UTC
6416aed Dr. Stephen Henson27 November 2013, 15:35:02 UTCSimplify and update openssl.spec27 November 2013, 15:35:02 UTC
2a1b7bd Dr. Stephen Henson18 November 2013, 18:49:46 UTCNew functions to retrieve certificate from SSL_CTX New functions to retrieve current certificate or private key from an SSL_CTX. Constify SSL_get_private_key(). (cherry picked from commit a25f9adc778e17568fe2a325e5c3606adb8329f1)18 November 2013, 18:59:18 UTC
4bba0bd Dr. Stephen Henson18 November 2013, 16:52:10 UTCDon't define SSL_select_next_proto if OPENSSL_NO_TLSEXT set (cherry picked from commit 60aeb18750382362ec1c4e1cf05a7222c99ec886)18 November 2013, 18:59:03 UTC
27baa83 Dr. Stephen Henson17 November 2013, 17:48:18 UTCUse correct header length in ssl3_send_certifcate_request (cherry picked from commit fdeaf55bf95e1e2a1e70cca8b68c7d8bbef7c8f0)17 November 2013, 17:50:11 UTC
1abfa78 Dr. Stephen Henson14 November 2013, 21:00:40 UTCConstify.14 November 2013, 21:00:40 UTC
edc687b Piotr Sikora13 November 2013, 23:40:01 UTCFix compilation with no-nextprotoneg. PR#310614 November 2013, 01:20:58 UTC
ff0bdbe Dr. Stephen Henson13 November 2013, 22:57:11 UTCAllow match selecting of current certificate. If pointer comparison for current certificate fails check to see if a match using X509_cmp succeeds for the current certificate: this is useful for cases where the certificate pointer is not available. (cherry picked from commit 6856b288a6e66edd23907b7fa264f42e05ac9fc7)13 November 2013, 23:47:49 UTC
dc4bdf5 Rob Stradling11 November 2013, 17:04:24 UTCAdditional "chain_cert" functions. PR#3169 This patch, which currently applies successfully against master and 1_0_2, adds the following functions: SSL_[CTX_]select_current_cert() - set the current certificate without disturbing the existing structure. SSL_[CTX_]get0_chain_certs() - get the current certificate's chain. SSL_[CTX_]clear_chain_certs() - clear the current certificate's chain. The patch also adds these functions to, and fixes some existing errors in, SSL_CTX_add1_chain_cert.pod. (cherry picked from commit 2f56c9c015dbca45379c9a725915b3b8e765a119)13 November 2013, 23:47:37 UTC
b03d051 Krzysztof Kwiatkowski13 November 2013, 22:45:16 UTCDelete duplicate entry. PR#3172 (cherry picked from commit 4f055e34c3598cad00fca097d812fa3e6436d967)13 November 2013, 23:47:26 UTC
0de7001 Andy Polyakov12 November 2013, 21:09:55 UTCsrp/srp_grps.h: make it Compaq C-friendly. PR: 3165 Submitted by: Daniel Richard G. (cherry picked from commit 2df9ec01d563f9cc2deab07e8c3391059d476592)12 November 2013, 21:19:40 UTC
220d1e5 Andy Polyakov12 November 2013, 20:59:01 UTCmodes/asm/ghash-alpha.pl: update from HEAD. PR: 316512 November 2013, 20:59:01 UTC
ca44f72 Andy Polyakov12 November 2013, 20:49:15 UTCMake Makefiles OSF-make-friendly. PR: 3165 (cherry picked from commit d1cf23ac86c05b22b8780e2c03b67230564d2d34)12 November 2013, 20:53:39 UTC
18f4950 Dr. Stephen Henson11 November 2013, 22:39:40 UTCFix memory leak. (cherry picked from commit 16bc45ba956fdf07c7cda7feda88de597569df63)11 November 2013, 23:55:18 UTC
5c50462 Dr. Stephen Henson11 November 2013, 22:24:08 UTCTypo.11 November 2013, 22:24:08 UTC
a257865 Dr. Stephen Henson08 November 2013, 18:59:26 UTCFix for some platforms where "char" is unsigned. (cherry picked from commit 08b433540416c5bc9a874ba0343e35ba490c65f1)11 November 2013, 22:18:07 UTC
60adefa Andy Polyakov10 November 2013, 22:06:41 UTCMakefile.org: make FIPS build work with BSD make.10 November 2013, 22:06:41 UTC
b5dde6b Dr. Stephen Henson07 November 2013, 15:15:20 UTCCheck for missing components in RSA_check. (cherry picked from commit 01be36ef70525e81fc358d2e559bdd0a0d9427a5)09 November 2013, 15:09:22 UTC
024dbfd Dr. Stephen Henson07 November 2013, 17:27:07 UTCDocument RSAPublicKey_{in,out} options. (cherry picked from commit 7040d73d22987532faa503630d6616cf2788c975)09 November 2013, 15:09:22 UTC
233069f Dr. Stephen Henson07 November 2013, 03:55:49 UTCAdd CMS_SignerInfo_get0_signature function. Add function to retrieve the signature from a CMS_SignerInfo structure: applications can then read or modify it. (cherry picked from commit e8df6cec4c09b9a94c4c07abcf0402d31ec82cc1)09 November 2013, 15:09:22 UTC
c76d692 Andy Polyakov08 November 2013, 22:00:35 UTCengines/ccgost/gost89.h: make word32 defintion unconditional. Original definition depended on __LONG_MAX__ that is not guaranteed to be present. As we don't support platforms with int narrower that 32 bits it's appropriate to make defition inconditional. PR: 3165 (cherry picked from commit 96180cac04591abfe50fc86096365553484bde65)08 November 2013, 22:10:21 UTC
3241496 Andy Polyakov08 November 2013, 21:56:44 UTCmodes/asm/ghash-alpha.pl: make it work with older assembler. PR: 3165 (cherry picked from commit d24d1d7daf515aa19fbf18f6371e3e617028a07c)08 November 2013, 22:10:09 UTC
63fe69c Dr. Stephen Henson06 November 2013, 14:38:28 UTCEnable PSK in FIPS mode. Enable PSK ciphersuites with AES or DES3 in FIPS mode. (cherry picked from commit e0ffd129c16af90eb5e2ce54e57832c0046d1aaf)06 November 2013, 14:39:41 UTC
a4947e4 Dr. Stephen Henson06 November 2013, 13:16:50 UTCInitialise context before using it.06 November 2013, 13:16:50 UTC
262f1c5 Ben Laurie03 November 2013, 17:23:50 UTCPBKDF2 should be efficient. Contributed by Christian Heimes <christian@python.org>.03 November 2013, 17:27:12 UTC
bd80d02 Dr. Stephen Henson02 November 2013, 14:07:21 UTCAdd brainpool curves to trace output.02 November 2013, 14:07:21 UTC
163d794 Dr. Stephen Henson01 November 2013, 21:39:56 UTCFix warning. (cherry picked from commit 96e16bddb42563dc09187939dc20b35369d413b7)02 November 2013, 14:02:00 UTC
0b33466 Dr. Stephen Henson22 October 2013, 06:35:22 UTCAdd SSL_CONF command to set DH Parameters. (cherry picked from commit c557f921dcb20a1bf2ce75e9dc7dd164e59ec3ea)02 November 2013, 13:42:03 UTC
bed27f4 Dr. Stephen Henson22 October 2013, 04:37:10 UTCFix argument processing. (cherry picked from commit abf840e4f71c3a8795428c213fd37ece2a910443)02 November 2013, 13:41:51 UTC
738a224 Dr. Stephen Henson21 October 2013, 06:19:01 UTCConstification. (cherry picked from commit 27f3b65f49ea91fcf4b46ec0298be51b4207214a)02 November 2013, 13:41:38 UTC
044f8ca Dr. Stephen Henson18 October 2013, 15:09:12 UTCExtend SSL_CONF Extend SSL_CONF to return command value types. Add certificate and key options. Update documentation. (cherry picked from commit ec2f7e568ea18a22ab57326fffe78ef2aa6884f5)02 November 2013, 13:41:19 UTC
45ee08d Dr. Stephen Henson17 October 2013, 15:07:27 UTCTypo. (cherry picked from commit 13af1451595b514524b0efc17f99f6392ce090d5)02 November 2013, 13:41:06 UTC
5ff68e8 Piotr Sikora01 November 2013, 21:35:46 UTCFix SSL_OP_SINGLE_ECDH_USE Don't require a public key in tls1_set_ec_id if compression status is not needed. This fixes a bug where SSL_OP_SINGLE_ECDH_USE wouldn't work.01 November 2013, 21:37:46 UTC
f14a4a8 Dr. Stephen Henson01 November 2013, 21:35:00 UTCAdd -ecdh_single option. Add -ecdh_single option to set SSL_OP_SINGLE_ECDH_USE on the command line.01 November 2013, 21:35:00 UTC
  • Newer
  • Older

ENEA — Copyright (C), ENEA. License: GNU AGPLv3+.
Legal notes  ::  JavaScript license information ::  Web API

back to top