Skip to main content
  • Home
  • login
  • Browse the archive

    swh mirror partner logo
swh logo
SoftwareHeritage
Software
Heritage
Mirror
Features
  • Search

  • Downloads

  • Save code now

  • Add forge now

  • Help


sort by:
RevisionAuthorDateMessageCommit Date
65e4dca Dr. Stephen Henson27 June 2014, 15:58:41 UTCRebuild OID table.27 June 2014, 15:58:41 UTC
ff4cfc4 Dr. Stephen Henson27 June 2014, 02:17:15 UTCFix OID encoding for one component. OIDs with one component don't have an encoding. PR#2556 (Bug#1) (cherry picked from commit 95791bf94150f2e3dc96fd2462627aaf354e92e4)27 June 2014, 15:58:16 UTC
f4623ab Tomas Mraz27 June 2014, 15:49:22 UTCDon't advertise ECC ciphersuits in SSLv2 compatible client hello. PR#3374 (cherry picked from commit 0436369fccd128cb7f6a8538d5fed1c876c437af)27 June 2014, 15:52:00 UTC
6ef3509 Jeffrey Walton27 June 2014, 15:33:06 UTCClarify docs. Document that the certificate passed to SSL_CTX_add_extra_chain_cert() should not be freed by the application. PR#3409 (cherry picked from commit 0535c2d67ca2d684087ef90be35d5fb207aab227)27 June 2014, 15:39:39 UTC
e42c208 Dr. Stephen Henson27 June 2014, 02:21:10 UTCMemory leak and NULL dereference fixes. PR#3403 (cherry picked from commit d2aea038297e0c64ca66e6844cbb37377365885e)27 June 2014, 13:52:36 UTC
e86951c Dr. Stephen Henson26 June 2014, 11:36:44 UTCRemove ancient obsolete files under pkcs7. (cherry picked from commit 7be6b27aaf5ed77f13c93dc89a2c27a42082db3f)27 June 2014, 12:53:23 UTC
b7a4f98 Huzaifa Sidhpurwala26 June 2014, 22:45:58 UTCMake sure BN_sqr can never return a negative value. PR#3410 (cherry picked from commit e14e764c0d5d469da63d0819c6ffc0e1e9e7f0bb)26 June 2014, 22:56:32 UTC
82a9daf Andy Polyakov26 June 2014, 22:07:15 UTCbn_exp.c: move check for AD*X to rsaz-avx2.pl. This ensures high performance is situations when assembler supports AVX2, but not AD*X. (cherry picked from commit f3f620e1e0fa3553116f0b3e8c8d68b070fcdb79) Resolved conflicts: crypto/bn/asm/rsaz-avx2.pl26 June 2014, 22:36:05 UTC
1536bcf Andy Polyakov25 June 2014, 20:10:45 UTCaesv8-armx.pl: rigid input verification in key setup. (cherry picked from commit 7b8c8c4d7973f17bbbee45d4718224c5853d9dc7)25 June 2014, 20:12:08 UTC
3fc0b1e Viktor Dukhovni23 June 2014, 00:14:53 UTCX509_check_mumble() failure is <= 0, not just 0 (cherry picked from commit a48fb0400c9c45d56144966b774998ebe37804ef)25 June 2014, 17:21:36 UTC
3d15d58 Viktor Dukhovni23 June 2014, 00:18:53 UTCMore complete input validation of X509_check_mumble (cherry picked from commit 29edebe95c2a51470c78c7e769c926719965eeb1)25 June 2014, 17:21:35 UTC
d93edc0 Viktor Dukhovni22 June 2014, 05:35:44 UTCDrop hostlen from X509_VERIFY_PARAM_ID. Just store NUL-terminated strings. This works better when we add support for multiple hostnames. (cherry picked from commit b3012c698a086937319ed413a113ed7bec1edd1a)25 June 2014, 17:21:35 UTC
609daab Viktor Dukhovni22 June 2014, 05:31:00 UTCMore complete X509_check_host documentation. (cherry picked from commit d241b804099ce28c053ba988eb5532b1a32dd51e)25 June 2014, 17:21:35 UTC
a073cee Andy Polyakov24 June 2014, 06:08:58 UTCaesv8-armx.pl: inclrease interleave factor. This is to compensate for higher aes* instruction latency on Cortex-A57. (cherry picked from commit 015364baf3328b93dbed2613e59170715a2a11a6)24 June 2014, 06:10:37 UTC
5cd8ce4 Andy Polyakov24 June 2014, 06:06:05 UTCARMv8 assembly pack: add Cortex performance numbers. (cherry picked from commit 0f777aeb50b109052d41b8a55d97faecf728ea00)24 June 2014, 06:07:04 UTC
d15f2d9 Miod Vallat04 June 2014, 07:59:58 UTCFix off-by-one errors in ssl_cipher_get_evp() In the ssl_cipher_get_evp() function, fix off-by-one errors in index validation before accessing arrays. Bug discovered and fixed by Miod Vallat from the OpenBSD team. PR#337522 June 2014, 22:18:15 UTC
00f5ee4 Matt Caswell22 June 2014, 22:17:40 UTCRevert "Fix off-by-one errors in ssl_cipher_get_evp()" This reverts commit 3d86077427f93dc46b18fee706b567ec32ac232a. Incorrect attribution.22 June 2014, 22:17:40 UTC
e791153 Matt Caswell26 May 2014, 23:26:55 UTCFixed Windows compilation failure22 June 2014, 18:18:09 UTC
6ff7342 Richard Levitte18 June 2014, 11:41:54 UTCMake sure test/tests.com exit gracefully, even when openssl.exe wasn't properly built.18 June 2014, 11:43:10 UTC
a61e509 Richard Levitte17 June 2014, 13:57:04 UTCAdjust VMS build to Unix build. Most of all, make it so the disabled algorithms MD2 and RC5 don't get built. Also, disable building the test apps in crypto/des and crypto/pkcs7, as they have no support at all.18 June 2014, 11:43:09 UTC
1b82349 Felix Laurie von Massenbach15 June 2014, 10:58:33 UTCFix signed/unsigned comparisons. (cherry picked from commit 50cc4f7b3d64621b6062ad1f16a7630b7c730d9b)17 June 2014, 17:38:36 UTC
6657e68 Felix Laurie von Massenbach15 June 2014, 10:52:06 UTCFix shadow declaration. (cherry picked from commit 1f61d8b5b1bda282015236fe9860d2f6de127356)17 June 2014, 17:36:48 UTC
23351c6 Richard Levitte17 June 2014, 10:38:20 UTCRemove unused DANE macros. This should be the last DANE stuff...17 June 2014, 10:38:20 UTC
9a6112d Richard Levitte16 June 2014, 11:24:41 UTCDCL doesn't do well with empty lines, or lines starting with #16 June 2014, 11:25:16 UTC
b9c0dae Richard Levitte16 June 2014, 11:24:04 UTCSpaces were added in some strings for better readability. However, those spaces do not belong in file names, so when picking out the individual parts, remove the spaces16 June 2014, 11:25:16 UTC
d940b3b Andy Polyakov16 June 2014, 08:11:45 UTCaesni-sha[1|256]-x86_64.pl: fix logical error and MacOS X build. (cherry picked from commit 9024b84b7c9a36f75bffc5c77cc86bbe2911653e)16 June 2014, 08:12:56 UTC
cfbc10f Viktor Dukhovni14 June 2014, 03:45:56 UTCEnforce _X509_CHECK_FLAG_DOT_SUBDOMAINS internal-only (cherry picked from commit d435e23959f1c2cb4feadbfba9ad884c59f37db9)14 June 2014, 21:31:28 UTC
90d94ce Dr. Stephen Henson14 June 2014, 21:24:08 UTCAccept CCS after sending finished. Allow CCS after finished has been sent by client: at this point keys have been correctly set up so it is OK to accept CCS from server. Without this renegotiation can sometimes fail. PR#3400 (cherry picked from commit 99cd6a91fcb0931feaebbb4832681d40a66fad41)14 June 2014, 21:31:28 UTC
79b960c Andy Polyakov14 June 2014, 21:15:39 UTCevp/e_aes_cbc_sha[1|256].c: fix -DPEDANTIC build. (cherry picked from commit ce00c64df9eb78402950e179b54e7745210b04f2)14 June 2014, 21:16:29 UTC
66a6e2b Richard Levitte14 June 2014, 14:10:40 UTCAdjust VMS build files to the Unix ones14 June 2014, 14:58:11 UTC
1be1d05 Richard Levitte14 June 2014, 13:13:44 UTCMake sure that disabling the MAYLOSEDATA3 warning is only done when the compiler supports it. Otherwise, there are warnings about it lacking everywhere, which is quite tedious to read through while trying to check for other warnings.14 June 2014, 14:58:11 UTC
9f8c183 Richard Levitte12 June 2014, 14:59:47 UTCUpdate the VMS tests according to the latest unixly tests. Partly provided by Zoltan Arpadffy <arpadffy@polarhome.com>14 June 2014, 14:58:11 UTC
8301245 Andy Polyakov14 June 2014, 14:03:06 UTCaesni-sha256-x86_64.pl: add missing rex in shaext. PR: 3405 (cherry picked from commit 91a6bf80f8af5fcafececc443e7fbc7981af127b)14 June 2014, 14:04:04 UTC
1f6d207 Andy Polyakov14 June 2014, 13:26:14 UTCsha1-x86_64.pl: add missing rex prefix in shaext. PR: 3405 (cherry picked from commit c9cf29cca22d4d724a1e772bc5fdc201b2822f1d)14 June 2014, 13:28:38 UTC
561ba12 Matt Caswell10 June 2014, 22:24:28 UTCFixed incorrect return code handling in ssl3_final_finish_mac. Based on an original patch by Joel Sing (OpenBSD) who also originally identified the issue.13 June 2014, 14:50:58 UTC
7f133c3 Matt Caswell13 June 2014, 14:50:28 UTCRevert "Fixed incorrect return code handling in ssl3_final_finish_mac" This reverts commit 728bd41a159ea16a60111e7c1120ec2a005507b3. Missing attribution.13 June 2014, 14:50:28 UTC
3cc8a3f Viktor Dukhovni12 June 2014, 05:56:31 UTCClient-side namecheck wildcards. A client reference identity of ".example.com" matches a server certificate presented identity that is any sub-domain of "example.com" (e.g. "www.sub.example.com). With the X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS flag, it matches only direct child sub-domains (e.g. "www.sub.example.com"). (cherry picked from commit e52c52f10bb8e34aaf8f28f3e5b56939e8f6b357)12 June 2014, 22:19:24 UTC
3d86077 Kurt Cancemi04 June 2014, 07:59:58 UTCFix off-by-one errors in ssl_cipher_get_evp() In the ssl_cipher_get_evp() function, fix off-by-one errors in index validation before accessing arrays. PR#337512 June 2014, 20:12:43 UTC
56ba280 Andy Polyakov12 June 2014, 19:45:41 UTCFacilitate back-porting of AESNI and SHA modules. Fix SEH and stack handling in Win64 build. (cherry picked from commit 977f32e85241cba8be53e44dade32231e8a91718)12 June 2014, 19:51:35 UTC
955bfbc Matt Caswell12 June 2014, 19:38:45 UTCAdded OPENSSL_assert check as per PR#3377 reported by Rainer Jung <rainer.jung@kippdata.de>12 June 2014, 19:42:33 UTC
2eab488 Dr. Stephen Henson12 June 2014, 10:08:52 UTCremove some more DANE code12 June 2014, 10:09:14 UTC
fa7a0ef Dr. Stephen Henson12 June 2014, 09:50:12 UTCmake update12 June 2014, 09:52:49 UTC
3fe8f00 Dr. Stephen Henson12 June 2014, 09:48:24 UTCFix Windows build.12 June 2014, 09:52:49 UTC
5af0977 Dr. Stephen Henson12 June 2014, 09:45:24 UTCRemove unimplemented functions.12 June 2014, 09:52:49 UTC
995d08d Richard Levitte12 June 2014, 14:59:47 UTCUpdate the VMS build according to the latest unixly build. Partly provided by Zoltan Arpadffy <arpadffy@polarhome.com>12 June 2014, 14:59:47 UTC
ca422f3 Richard Levitte12 June 2014, 14:58:39 UTCThe 1.0.2 cms-test.pl had some changes that don't quite work on VMS...12 June 2014, 14:58:39 UTC
68a1e0b Richard Levitte12 June 2014, 10:21:58 UTCBring in the 1.0.1g to 1.0.1h changes into CHANGES.12 June 2014, 10:22:24 UTC
ed6c278 Richard Levitte12 June 2014, 10:18:13 UTCSmall cleanup, double entry in CHANGES.12 June 2014, 10:18:13 UTC
d85a772 Andy Polyakov11 June 2014, 18:40:51 UTCEnable multi-block support by default. (cherry picked from commit 77a27a5066e8c0975d78be635ed356749a6f16db)11 June 2014, 18:41:46 UTC
fb2f9f2 Dr. Stephen Henson11 June 2014, 13:31:08 UTCFix compilation with no-comp (cherry picked from commit 7239a09c7b5757ed8d0e9869f3e9b03c0e11f4d1)11 June 2014, 13:41:00 UTC
66aeaec Andy Polyakov11 June 2014, 09:34:18 UTCghash-x86_64.pl: optimize for upcoming Atom. (cherry picked from commit 1cf8f57b43a99275ac0938e9e230bd0434699d87)11 June 2014, 09:35:23 UTC
70fddbe Andy Polyakov11 June 2014, 08:27:45 UTCAdd support for Intel SHA extension. (cherry picked from commit 619b94667cc7a097f6d1e2123c4f4c2c85afb8f7)11 June 2014, 08:30:31 UTC
5fc3d33 Rob Stradling12 May 2014, 13:40:19 UTCSeparate the SCT List parser from the SCT List viewer (cherry picked from commit fd2309aa29e3ea00e445f03407820398962c0b94)10 June 2014, 23:10:45 UTC
728bd41 Matt Caswell10 June 2014, 22:24:28 UTCFixed incorrect return code handling in ssl3_final_finish_mac10 June 2014, 22:32:27 UTC
77fb5a3 Andy Polyakov06 June 2014, 18:48:35 UTCEngage GHASH for ARMv8. (cherry picked from commit 82741e9c8980f96e4b3bba9e54e5904bc3e385bd)10 June 2014, 22:10:00 UTC
7344089 Andy Polyakov06 June 2014, 18:43:02 UTCAdd GHASH for ARMv8 Crypto Extension. Result of joint effort with Ard Biesheuvel. (cherry picked from commit 2d5a799d27d36ee0477b2e05a7aa14394e3ad4fc)10 June 2014, 22:09:35 UTC
7e03acf Andy Polyakov10 June 2014, 22:08:03 UTCEngage ARMv8 AES support [from HEAD].10 June 2014, 22:08:03 UTC
9af4cb3 Andy Polyakov10 June 2014, 22:06:27 UTCAdd AES module for ARMv8 Crypto Extension [from HEAD].10 June 2014, 22:06:27 UTC
a00caa0 Andy Polyakov06 June 2014, 18:50:43 UTCsha[1|512]-armv8.pl: get instruction endianness right. Submitted by: Ard Biesheuvel. (cherry picked from commit cd91fd7c32428c0deb503f19b8061e0980476876)10 June 2014, 21:34:53 UTC
4672acf Andy Polyakov01 June 2014, 16:03:51 UTClinux-aarch64: engage SHA modules. (cherry picked from commit f8aab6174c217fe4764652dab926e434e7838ce8)10 June 2014, 21:32:26 UTC
ea61b32 Andy Polyakov01 June 2014, 16:02:11 UTCAdd SHA for ARMv8. (cherry picked from commit ddb6b965da0087dadea5488fe11646e3777c66e1)10 June 2014, 21:32:16 UTC
dabfbea Andy Polyakov01 June 2014, 15:21:06 UTCAdd linux-aarch64 taget. armcap.c is shared between 32- and 64-bit builds and features link-time detection of getauxval. Submitted by: Ard Biesheuvel. (cherry picked from commit e8d93e342b4b7d43c73e955e81e227c514d389d9)10 June 2014, 21:20:55 UTC
56d9737 Andy Polyakov10 June 2014, 21:08:06 UTCaesni-mb-x86_64.pl: add Win64 SEH. (cherry picked from commit e2eabed110b6d88fd15ac3063cab23dcd5090b44)10 June 2014, 21:09:04 UTC
3a97ebb Andy Polyakov06 June 2014, 19:27:18 UTCARM assembly pack: get ARMv7 instruction endianness right. Pointer out and suggested by: Ard Biesheuvel. (cherry picked from commit 5dcf70a1c57c2019bfad640fe14fd4a73212860a)10 June 2014, 20:51:15 UTC
16f4d2e Andy Polyakov01 June 2014, 20:32:55 UTCarmv4cpuid.S: switch to CNTVCT tick counter. (cherry picked from commit 723463282fab13a686a30779c401b98b82134a62)10 June 2014, 20:50:18 UTC
1f72a76 Andy Polyakov01 June 2014, 20:29:50 UTCsha[1|256]-armv4: harmonize with arm_arch.h. (cherry picked from commit 797d24bee9523e5cac14fe82a4dad356d1ec67f9)10 June 2014, 20:49:54 UTC
f5247ce Andy Polyakov04 May 2014, 08:57:55 UTCsha/asm/sha1-armv4-large.pl: add NEON and ARMv8 code paths. sha/asm/sha256-armv4.pl: add ARMv8 code path. (cherry picked from commit 9250a30692e182957d3fe48e3e07b1824ca1453a)10 June 2014, 20:48:27 UTC
3da2c3d Andy Polyakov04 May 2014, 08:55:49 UTCcrypto/armcap.c: detect ARMv8 capabilities [in 32-bit build]. (cherry picked from commit 4afa9f033dd58465b4c2d119a9d8cd737edeba26)10 June 2014, 20:47:19 UTC
4ceddee Hubert Kario10 June 2014, 11:53:12 UTCbackport changes to ciphers(1) man page Backport of patch: add ECC strings to ciphers(1), point out difference between DH and ECDH and backport of other other assorted fixes to this man page * Make a clear distinction between DH and ECDH key exchange. * Group all key exchange cipher suite identifiers, first DH then ECDH * add descriptions for all supported *DH* identifiers * add ECDSA authentication descriptions * add example showing how to disable all suites that offer no authentication or encryption * update status of static DH (it's now supported) * backport descriptions of AES128, AES256, AESGCM * backport descriptions of CAMELLIA128, CAMELLIA256 * backport listing of standard names for ECC cipher suites and TLSv1.2 cipher suites * backport description of PSK cipher suites10 June 2014, 19:55:14 UTC
2fddc5f Mike Bland07 June 2014, 17:05:50 UTCCreate test/testutil.h for unit test helper macros Defines SETUP_TEST_FIXTURE and EXECUTE_TEST, and updates ssl/heartbeat_test.c using these macros. SETUP_TEST_FIXTURE makes use of the new TEST_CASE_NAME macro, defined to use __func__ or __FUNCTION__ on platforms that support those symbols, or to use the file name and line number otherwise. This should fix several reported build problems related to lack of C99 support.10 June 2014, 18:24:46 UTC
e3beef1 Dr. Stephen Henson06 June 2014, 17:56:24 UTCRemove experimental DANE code. Remove experimental DANE/dnssec code: not ready for use in an official release yet.10 June 2014, 13:59:10 UTC
cea5a1d Dr. Stephen Henson10 June 2014, 13:47:29 UTCFix null pointer errors. PR#3394 (cherry picked from commit 7a9d59c148b773f59a41f8697eeecf369a0974c2)10 June 2014, 13:48:02 UTC
f472ada Dr. Stephen Henson09 June 2014, 11:03:12 UTCSRP ciphersuite correction. SRP ciphersuites do not have no authentication. They have authentication based on SRP. Add new SRP authentication flag and cipher string. (cherry picked from commit a86b88acc373ac1fb0ca709a5fb8a8fa74683f67)09 June 2014, 11:09:51 UTC
05b2210 Dr. Stephen Henson09 June 2014, 07:55:37 UTCUpdate strength_bits for 3DES. Fix strength_bits to 112 for 3DES. (cherry picked from commit 837c203719205ab19b5609b2df7151be8df05687)09 June 2014, 11:09:51 UTC
33e1a1d Kurt Roeckx07 June 2014, 11:32:23 UTCLink heartbeat_test with the static version of the libraries It's using an internal API that that might not be available in the shared library.08 June 2014, 23:12:37 UTC
38956b0 Jakub Wilk07 June 2014, 12:37:17 UTCCreate ~/.rnd with mode 0600 instead of 0666 Because of a missing include <fcntl.h> we don't have O_CREATE and don't create the file with open() using mode 0600 but fall back to using fopen() with the default umask followed by a chmod(). Problem found by Jakub Wilk <jwilk@debian.org>.08 June 2014, 20:20:34 UTC
a21f350 Dr. Stephen Henson07 June 2014, 14:21:13 UTCMake tls_session_secret_cb work with CVE-2014-0224 fix. If application uses tls_session_secret_cb for session resumption set the CCS_OK flag. (cherry picked from commit 953c592572e8811b7956cc09fbd8e98037068b58)07 June 2014, 14:27:23 UTC
74360af Dr. Stephen Henson06 June 2014, 18:05:59 UTCUpdate NEWS.07 June 2014, 14:27:23 UTC
5400882 Matt Caswell07 June 2014, 11:30:18 UTCFixed minor duplication in docs07 June 2014, 11:31:38 UTC
eb6508d Dr. Stephen Henson13 May 2014, 17:48:31 UTCFix for CVE-2014-0195 A buffer overrun attack can be triggered by sending invalid DTLS fragments to an OpenSSL DTLS client or server. This is potentially exploitable to run arbitrary code on a vulnerable client or server. Fixed by adding consistency check for DTLS fragments. Thanks to Jüri Aedla for reporting this issue. (cherry picked from commit 1632ef744872edc2aa2a53d487d3e79c965a4ad3)05 June 2014, 12:24:50 UTC
77719ae Dr. Stephen Henson16 May 2014, 11:49:48 UTCFix for CVE-2014-0224 Only accept change cipher spec when it is expected instead of at any time. This prevents premature setting of session keys before the master secret is determined which an attacker could use as a MITM attack. Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for reporting this issue and providing the initial fix this patch is based on. (cherry picked from commit bc8923b1ec9c467755cd86f7848c50ee8812e441)05 June 2014, 12:24:46 UTC
9d2c9dd Dr. Stephen Henson16 May 2014, 11:55:16 UTCAdditional CVE-2014-0224 protection. Return a fatal error if an attempt is made to use a zero length master secret. (cherry picked from commit 006cd7083f76ed5cb0d9a914857e9231ef1bc317)05 June 2014, 12:24:40 UTC
8942b92 Dr. Stephen Henson16 May 2014, 12:00:45 UTCFix CVE-2014-0221 Unnecessary recursion when receiving a DTLS hello request can be used to crash a DTLS client. Fixed by handling DTLS hello request without recursion. Thanks to Imre Rad (Search-Lab Ltd.) for discovering this issue. (cherry picked from commit d3152655d5319ce883c8e3ac4b99f8de4c59d846)05 June 2014, 12:24:36 UTC
e5f7065 Dr. Stephen Henson29 May 2014, 14:00:05 UTCFix CVE-2014-3470 Check session_cert is not NULL before dereferencing it. (cherry picked from commit 8011cd56e39a433b1837465259a9bd24a38727fb)05 June 2014, 12:24:30 UTC
a5d03c5 Libor Krystek03 June 2014, 22:14:40 UTCCorrected OPENSSL_NO_EC_NISTP_64_GCC_128 usage in ec_lcl.h. PR#337003 June 2014, 22:17:21 UTC
56b94a3 David Benjamin02 June 2014, 17:55:20 UTCCheck there is enough room for extension. (cherry picked from commit 7d89b3bf42e4b4067371ab33ef7631434e41d1e4)02 June 2014, 17:59:48 UTC
d52eb82 zhu qun-ying02 June 2014, 13:38:52 UTCFree up s->d1->buffered_app_data.q properly. PR#3286 (cherry picked from commit 71e95000afb2227fe5cac1c79ae884338bcd8d0b)02 June 2014, 13:40:05 UTC
4967a83 Dr. Stephen Henson02 June 2014, 13:12:07 UTCAllow reordering of certificates when signing. Add certificates if -nocerts and -certfile specified when signing in smime application. This can be used this to specify the order certificates appear in the PKCS#7 structure: some broken applications require a certain ordering. PR#3316 (cherry picked from commit e114abee9ec084a56c1d6076ac6de8a7a3a5cf34)02 June 2014, 13:19:43 UTC
6468866 Sami Farin02 June 2014, 11:24:19 UTCTypo: set i to -1 before goto. PR#3302 (cherry picked from commit 9717f01951f976f76dd40a38d9fc7307057fa4c4)02 June 2014, 12:53:54 UTC
de8a5b5 Matt Caswell01 June 2014, 20:32:19 UTCAdded SSLErr call for internal error in dtls1_buffer_record01 June 2014, 20:40:31 UTC
8de85b0 David Ramos01 June 2014, 20:28:41 UTCDelays the queue insertion until after the ssl3_setup_buffers() call due to use-after-free bug. PR#336201 June 2014, 20:40:25 UTC
8d71574 Dr. Stephen Henson01 June 2014, 15:25:43 UTCRecognise padding extension. (cherry picked from commit ea2bb861f0daaa20819bf9ac8c146f7593feacd4) Conflicts: apps/s_cb.c01 June 2014, 15:50:25 UTC
623a01d Dr. Stephen Henson01 June 2014, 15:08:18 UTCOption to disable padding extension. Add TLS padding extension to SSL_OP_ALL so it is used with other "bugs" options and can be turned off. This replaces SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG which is an ancient option referring to SSLv2 and SSLREF. PR#3336 (cherry picked from commit 758415b2259fa45d3fe17d8e53ae1341b7b6e482) Conflicts: ssl/t1_lib.c01 June 2014, 15:50:25 UTC
08b172b Dr. Stephen Henson01 June 2014, 14:03:00 UTCSet default global mask to UTF8 only. (cherry picked from commit 3009244da47b989c4cc59ba02cf81a4e9d8f8431)01 June 2014, 14:04:21 UTC
856a458 David Ramos01 June 2014, 13:23:51 UTCAllocate extra space when NETSCAPE_HANG_BUG defined. Make sure there is an extra 4 bytes for server done message when NETSCAPE_HANG_BUG is defined. PR#3361 (cherry picked from commit 92d81ba622396425764d676ba4fb3f0dac273f17)01 June 2014, 13:27:58 UTC
3329765 David Ramos01 June 2014, 12:03:05 UTCInitialise alg. PR#3313 (cherry picked from commit 7e2c6f7eb01515a990f77fbc5441be8e1a17152a)01 June 2014, 12:05:08 UTC
87a0cbd Dr. Stephen Henson30 May 2014, 12:21:43 UTCUse correct digest when exporting keying material. PR#3319 (cherry picked from commit 84691390eae86befd33c83721dacedb539ae34e6)30 May 2014, 12:24:36 UTC
b5bdde9 Dr. Stephen Henson30 May 2014, 12:10:08 UTCDon't compile heartbeat test code on Windows (for now). (cherry picked from commit 2c575907d2c8601a18716f718ce309ed4e1f1783)30 May 2014, 12:12:26 UTC
1788072 Dr. Stephen Henson29 May 2014, 13:07:49 UTCSet version number correctly. PR#3249 (cherry picked from commit 8909bf20269035d295743fca559207ef2eb84eb3)29 May 2014, 13:08:54 UTC
5f2b5e3 František Bořánek29 May 2014, 12:49:10 UTCFix memory leak. PR#3278 (cherry picked from commit de56fe797081fc09ebd1add06d6e2df42a324fd5)29 May 2014, 12:49:50 UTC
  • Newer
  • Older

ENEA — Copyright (C), ENEA. License: GNU AGPLv3+.
Legal notes  ::  JavaScript license information ::  Web API

back to top