Skip to main content
  • Home
  • login
  • Browse the archive

    swh mirror partner logo
swh logo
SoftwareHeritage
Software
Heritage
Mirror
Features
  • Search

  • Downloads

  • Save code now

  • Add forge now

  • Help

swh:1:snp:dc2a5002442a00b1c0eda7c65d04ea7455e166cd
  • Code
  • Branches (204)
  • Releases (207)
    • Branches
    • Releases
    • HEAD
    • refs/heads/OpenSSL-engine-0_9_6-stable
    • refs/heads/OpenSSL-fips-0_9_7-stable
    • refs/heads/OpenSSL-fips-0_9_8-stable
    • refs/heads/OpenSSL-fips-1_2-stable
    • refs/heads/OpenSSL-fips-2_0-dev
    • refs/heads/OpenSSL-fips-2_0-stable
    • refs/heads/OpenSSL-fips2-0_9_7-stable
    • refs/heads/OpenSSL_0_9_6-stable
    • refs/heads/OpenSSL_0_9_7-stable
    • refs/heads/OpenSSL_0_9_8-stable
    • refs/heads/OpenSSL_0_9_8fg-stable
    • refs/heads/OpenSSL_1_0_0-stable
    • refs/heads/OpenSSL_1_0_1-stable
    • refs/heads/OpenSSL_1_0_2-stable
    • refs/heads/OpenSSL_1_1_0-stable
    • refs/heads/OpenSSL_1_1_1-stable
    • refs/heads/SSLeay
    • refs/heads/feature/dtls-1.3
    • refs/heads/feature/ech
    • refs/heads/feature/quic-server
    • refs/heads/master
    • refs/heads/openssl-3.0
    • refs/heads/openssl-3.1
    • refs/heads/openssl-3.2
    • refs/heads/openssl-3.3
    • refs/heads/openssl-3.4
    • refs/heads/tls1.3-draft-18
    • refs/heads/tls1.3-draft-19
    • refs/tags/AFTER_COMPAQ_PATCH
    • refs/tags/BEFORE_COMPAQ_PATCH
    • refs/tags/BEFORE_engine
    • refs/tags/BEN_FIPS_TEST_1
    • refs/tags/BEN_FIPS_TEST_2
    • refs/tags/BEN_FIPS_TEST_3
    • refs/tags/BEN_FIPS_TEST_4
    • refs/tags/BEN_FIPS_TEST_5
    • refs/tags/BEN_FIPS_TEST_6
    • refs/tags/BEN_FIPS_TEST_7
    • refs/tags/BEN_FIPS_TEST_8
    • refs/tags/FIPS_098_TEST_1
    • refs/tags/FIPS_098_TEST_2
    • refs/tags/FIPS_098_TEST_3
    • refs/tags/FIPS_098_TEST_4
    • refs/tags/FIPS_098_TEST_5
    • refs/tags/FIPS_098_TEST_6
    • refs/tags/FIPS_098_TEST_7
    • refs/tags/FIPS_098_TEST_8
    • refs/tags/FIPS_TEST_10
    • refs/tags/FIPS_TEST_9
    • refs/tags/LEVITTE_after_const
    • refs/tags/LEVITTE_before_const
    • refs/tags/OpenSSL-engine-0_9_6
    • refs/tags/OpenSSL-engine-0_9_6-beta1
    • refs/tags/OpenSSL-engine-0_9_6-beta2
    • refs/tags/OpenSSL-engine-0_9_6-beta3
    • refs/tags/OpenSSL-engine-0_9_6a
    • refs/tags/OpenSSL-engine-0_9_6a-beta1
    • refs/tags/OpenSSL-engine-0_9_6a-beta2
    • refs/tags/OpenSSL-engine-0_9_6a-beta3
    • refs/tags/OpenSSL-engine-0_9_6b
    • refs/tags/OpenSSL-engine-0_9_6c
    • refs/tags/OpenSSL-engine-0_9_6d
    • refs/tags/OpenSSL-engine-0_9_6d-beta1
    • refs/tags/OpenSSL-engine-0_9_6e
    • refs/tags/OpenSSL-engine-0_9_6f
    • refs/tags/OpenSSL-engine-0_9_6g
    • refs/tags/OpenSSL-engine-0_9_6h
    • refs/tags/OpenSSL-engine-0_9_6i
    • refs/tags/OpenSSL-engine-0_9_6j
    • refs/tags/OpenSSL-engine-0_9_6k
    • refs/tags/OpenSSL-engine-0_9_6l
    • refs/tags/OpenSSL-engine-0_9_6m
    • refs/tags/OpenSSL-fips-1_2_0
    • refs/tags/OpenSSL-fips-1_2_1
    • refs/tags/OpenSSL-fips-1_2_2
    • refs/tags/OpenSSL-fips-1_2_3
    • refs/tags/OpenSSL-fips-2_0
    • refs/tags/OpenSSL-fips-2_0-pl1
    • refs/tags/OpenSSL-fips-2_0-rc1
    • refs/tags/OpenSSL-fips-2_0-rc2
    • refs/tags/OpenSSL-fips-2_0-rc3
    • refs/tags/OpenSSL-fips-2_0-rc4
    • refs/tags/OpenSSL-fips-2_0-rc5
    • refs/tags/OpenSSL-fips-2_0-rc6
    • refs/tags/OpenSSL-fips-2_0-rc7
    • refs/tags/OpenSSL-fips-2_0-rc8
    • refs/tags/OpenSSL-fips-2_0-rc9
    • refs/tags/OpenSSL-fips-2_0_1
    • refs/tags/OpenSSL_0_9_1c
    • refs/tags/OpenSSL_0_9_2b
    • refs/tags/OpenSSL_0_9_3
    • refs/tags/OpenSSL_0_9_3a
    • refs/tags/OpenSSL_0_9_3beta1
    • refs/tags/OpenSSL_0_9_3beta2
    • refs/tags/OpenSSL_0_9_4
    • refs/tags/OpenSSL_0_9_5
    • refs/tags/OpenSSL_0_9_5a
    • refs/tags/OpenSSL_0_9_5a-beta1
    • refs/tags/OpenSSL_0_9_5a-beta2
    • refs/tags/OpenSSL_0_9_5beta1
    • refs/tags/OpenSSL_0_9_5beta2
    • refs/tags/OpenSSL_0_9_6
    • refs/tags/OpenSSL_0_9_6-beta1
    • refs/tags/OpenSSL_0_9_6-beta2
    • refs/tags/OpenSSL_0_9_6-beta3
    • refs/tags/OpenSSL_0_9_6a
    • refs/tags/OpenSSL_0_9_6a-beta1
    • refs/tags/OpenSSL_0_9_6a-beta2
    • refs/tags/OpenSSL_0_9_6a-beta3
    • refs/tags/OpenSSL_0_9_6b
    • refs/tags/OpenSSL_0_9_6c
    • refs/tags/OpenSSL_0_9_6d
    • refs/tags/OpenSSL_0_9_6d-beta1
    • refs/tags/OpenSSL_0_9_6e
    • refs/tags/OpenSSL_0_9_6f
    • refs/tags/OpenSSL_0_9_6g
    • refs/tags/OpenSSL_0_9_6h
    • refs/tags/OpenSSL_0_9_6i
    • refs/tags/OpenSSL_0_9_6j
    • refs/tags/OpenSSL_0_9_6k
    • refs/tags/OpenSSL_0_9_6l
    • refs/tags/OpenSSL_0_9_6m
    • refs/tags/OpenSSL_0_9_7
    • refs/tags/OpenSSL_0_9_7-beta1
    • refs/tags/OpenSSL_0_9_7-beta2
    • refs/tags/OpenSSL_0_9_7-beta3
    • refs/tags/OpenSSL_0_9_7-beta4
    • refs/tags/OpenSSL_0_9_7-beta5
    • refs/tags/OpenSSL_0_9_7-beta6
    • refs/tags/OpenSSL_0_9_7a
    • refs/tags/OpenSSL_0_9_7b
    • refs/tags/OpenSSL_0_9_7c
    • refs/tags/OpenSSL_0_9_7d
    • refs/tags/OpenSSL_0_9_7e
    • refs/tags/OpenSSL_0_9_7f
    • refs/tags/OpenSSL_0_9_7g
    • refs/tags/OpenSSL_0_9_7h
    • refs/tags/OpenSSL_0_9_7i
    • refs/tags/OpenSSL_0_9_7j
    • refs/tags/OpenSSL_0_9_7k
    • refs/tags/OpenSSL_0_9_7l
    • refs/tags/OpenSSL_0_9_7m
    • refs/tags/OpenSSL_0_9_8
    • refs/tags/OpenSSL_0_9_8-beta1
    • refs/tags/OpenSSL_0_9_8-beta2
    • refs/tags/OpenSSL_0_9_8-beta3
    • refs/tags/OpenSSL_0_9_8-beta4
    • refs/tags/OpenSSL_0_9_8-beta5
    • refs/tags/OpenSSL_0_9_8-beta6
    • refs/tags/OpenSSL_0_9_8a
    • refs/tags/OpenSSL_0_9_8b
    • refs/tags/OpenSSL_0_9_8c
    • refs/tags/OpenSSL_0_9_8d
    • refs/tags/OpenSSL_0_9_8e
    • refs/tags/OpenSSL_0_9_8f
    • refs/tags/OpenSSL_0_9_8g
    • refs/tags/OpenSSL_0_9_8h
    • refs/tags/OpenSSL_0_9_8i
    • refs/tags/OpenSSL_0_9_8j
    • refs/tags/OpenSSL_0_9_8k
    • refs/tags/OpenSSL_0_9_8l
    • refs/tags/OpenSSL_0_9_8m
    • refs/tags/OpenSSL_0_9_8m-beta1
    • refs/tags/OpenSSL_0_9_8n
    • refs/tags/OpenSSL_0_9_8o
    • refs/tags/OpenSSL_0_9_8p
    • refs/tags/OpenSSL_0_9_8q
    • refs/tags/OpenSSL_0_9_8r
    • refs/tags/OpenSSL_0_9_8s
    • refs/tags/OpenSSL_0_9_8t
    • refs/tags/OpenSSL_0_9_8u
    • refs/tags/OpenSSL_0_9_8v
    • refs/tags/OpenSSL_0_9_8w
    • refs/tags/OpenSSL_0_9_8x
    • refs/tags/OpenSSL_1_0_0
    • refs/tags/OpenSSL_1_0_0-beta1
    • refs/tags/OpenSSL_1_0_0-beta2
    • refs/tags/OpenSSL_1_0_0-beta3
    • refs/tags/OpenSSL_1_0_0-beta4
    • refs/tags/OpenSSL_1_0_0-beta5
    • refs/tags/OpenSSL_1_0_0a
    • refs/tags/OpenSSL_1_0_0b
    • refs/tags/OpenSSL_1_0_0c
    • refs/tags/OpenSSL_1_0_0d
    • refs/tags/OpenSSL_1_0_0e
    • refs/tags/OpenSSL_1_0_0f
    • refs/tags/OpenSSL_1_0_0g
    • refs/tags/OpenSSL_1_0_0h
    • refs/tags/OpenSSL_1_0_0i
    • refs/tags/OpenSSL_1_0_0j
    • refs/tags/OpenSSL_1_0_1
    • refs/tags/OpenSSL_1_0_1-beta1
    • refs/tags/OpenSSL_1_0_1-beta2
    • refs/tags/OpenSSL_1_0_1-beta3
    • refs/tags/OpenSSL_1_0_1a
    • refs/tags/OpenSSL_1_0_1b
    • refs/tags/OpenSSL_1_0_1c
    • refs/tags/OpenSSL_FIPS_1_0
    • refs/tags/SSLeay_0_8_1b
    • refs/tags/SSLeay_0_9_0b
    • refs/tags/SSLeay_0_9_1b
    • refs/tags/STATE_after_zlib
    • refs/tags/STATE_before_zlib
    • refs/tags/rsaref
    • 94f416601754dbe65e287f8e1eca01fa32f74a7a
    • openssl-3.4.0-alpha1
    • openssl-3.3.2
    • openssl-3.3.1
    • openssl-3.3.0-beta1
    • openssl-3.3.0-alpha1
    • openssl-3.3.0
    • openssl-3.2.3
    • openssl-3.2.2
    • openssl-3.2.1
    • openssl-3.2.0-beta1
    • openssl-3.2.0-alpha2
    • openssl-3.2.0-alpha1
    • openssl-3.2.0
    • openssl-3.1.7
    • openssl-3.1.6
    • openssl-3.1.5
    • openssl-3.1.4
    • openssl-3.1.3
    • openssl-3.1.2
    • openssl-3.1.1
    • openssl-3.1.0-beta1
    • openssl-3.1.0-alpha1
    • openssl-3.1.0
    • openssl-3.0.9
    • openssl-3.0.8
    • openssl-3.0.7
    • openssl-3.0.6
    • openssl-3.0.5
    • openssl-3.0.4
    • openssl-3.0.3
    • openssl-3.0.2
    • openssl-3.0.15
    • openssl-3.0.14
    • openssl-3.0.13
    • openssl-3.0.12
    • openssl-3.0.11
    • openssl-3.0.10
    • openssl-3.0.1
    • openssl-3.0.0-beta2
    • openssl-3.0.0-beta1
    • openssl-3.0.0-alpha9
    • openssl-3.0.0-alpha8
    • openssl-3.0.0-alpha7
    • openssl-3.0.0-alpha6
    • openssl-3.0.0-alpha5
    • openssl-3.0.0-alpha4
    • openssl-3.0.0-alpha3
    • openssl-3.0.0-alpha2
    • openssl-3.0.0-alpha17
    • openssl-3.0.0-alpha16
    • openssl-3.0.0-alpha15
    • openssl-3.0.0-alpha14
    • openssl-3.0.0-alpha13
    • openssl-3.0.0-alpha12
    • openssl-3.0.0-alpha11
    • openssl-3.0.0-alpha10
    • openssl-3.0.0-alpha1
    • openssl-3.0.0
    • master-pre-reformat
    • master-pre-auto-reformat
    • master-post-reformat
    • master-post-auto-reformat
    • OpenSSL_1_1_1w
    • OpenSSL_1_1_1v
    • OpenSSL_1_1_1u
    • OpenSSL_1_1_1t
    • OpenSSL_1_1_1s
    • OpenSSL_1_1_1r
    • OpenSSL_1_1_1q
    • OpenSSL_1_1_1p
    • OpenSSL_1_1_1o
    • OpenSSL_1_1_1n
    • OpenSSL_1_1_1m
    • OpenSSL_1_1_1l
    • OpenSSL_1_1_1k
    • OpenSSL_1_1_1j
    • OpenSSL_1_1_1i
    • OpenSSL_1_1_1h
    • OpenSSL_1_1_1g
    • OpenSSL_1_1_1f
    • OpenSSL_1_1_1e
    • OpenSSL_1_1_1d
    • OpenSSL_1_1_1c
    • OpenSSL_1_1_1b
    • OpenSSL_1_1_1a
    • OpenSSL_1_1_1-pre9
    • OpenSSL_1_1_1-pre8
    • OpenSSL_1_1_1-pre7
    • OpenSSL_1_1_1-pre6
    • OpenSSL_1_1_1-pre5
    • OpenSSL_1_1_1-pre4
    • OpenSSL_1_1_1-pre3
    • OpenSSL_1_1_1-pre2
    • OpenSSL_1_1_1-pre1
    • OpenSSL_1_1_1
    • OpenSSL_1_1_0l
    • OpenSSL_1_1_0k
    • OpenSSL_1_1_0j
    • OpenSSL_1_1_0i
    • OpenSSL_1_1_0h
    • OpenSSL_1_1_0g
    • OpenSSL_1_1_0f
    • OpenSSL_1_1_0e
    • OpenSSL_1_1_0d
    • OpenSSL_1_1_0c
    • OpenSSL_1_1_0b
    • OpenSSL_1_1_0a
    • OpenSSL_1_1_0-pre6
    • OpenSSL_1_1_0-pre5
    • OpenSSL_1_1_0-pre4
    • OpenSSL_1_1_0-pre3
    • OpenSSL_1_1_0-pre2
    • OpenSSL_1_1_0-pre1
    • OpenSSL_1_1_0
    • OpenSSL_1_0_2u
    • OpenSSL_1_0_2t
    • OpenSSL_1_0_2s
    • OpenSSL_1_0_2r
    • OpenSSL_1_0_2q
    • OpenSSL_1_0_2p
    • OpenSSL_1_0_2o
    • OpenSSL_1_0_2n
    • OpenSSL_1_0_2m
    • OpenSSL_1_0_2l
    • OpenSSL_1_0_2k
    • OpenSSL_1_0_2j
    • OpenSSL_1_0_2i
    • OpenSSL_1_0_2h
    • OpenSSL_1_0_2g
    • OpenSSL_1_0_2f
    • OpenSSL_1_0_2e
    • OpenSSL_1_0_2d
    • OpenSSL_1_0_2c
    • OpenSSL_1_0_2b
    • OpenSSL_1_0_2a
    • OpenSSL_1_0_2-pre-reformat
    • OpenSSL_1_0_2-pre-auto-reformat
    • OpenSSL_1_0_2-post-reformat
    • OpenSSL_1_0_2-post-auto-reformat
    • OpenSSL_1_0_2-beta3
    • OpenSSL_1_0_2-beta2
    • OpenSSL_1_0_2-beta1
    • OpenSSL_1_0_2
    • OpenSSL_1_0_1u
    • OpenSSL_1_0_1t
    • OpenSSL_1_0_1s
    • OpenSSL_1_0_1r
    • OpenSSL_1_0_1q
    • OpenSSL_1_0_1p
    • OpenSSL_1_0_1o
    • OpenSSL_1_0_1n
    • OpenSSL_1_0_1m
    • OpenSSL_1_0_1l
    • OpenSSL_1_0_1k
    • OpenSSL_1_0_1j
    • OpenSSL_1_0_1i
    • OpenSSL_1_0_1h
    • OpenSSL_1_0_1g
    • OpenSSL_1_0_1f
    • OpenSSL_1_0_1e
    • OpenSSL_1_0_1d
    • OpenSSL_1_0_1-pre-reformat
    • OpenSSL_1_0_1-pre-auto-reformat
    • OpenSSL_1_0_1-post-reformat
    • OpenSSL_1_0_1-post-auto-reformat
    • OpenSSL_1_0_0t
    • OpenSSL_1_0_0s
    • OpenSSL_1_0_0r
    • OpenSSL_1_0_0q
    • OpenSSL_1_0_0p
    • OpenSSL_1_0_0o
    • OpenSSL_1_0_0n
    • OpenSSL_1_0_0m
    • OpenSSL_1_0_0l
    • OpenSSL_1_0_0k
    • OpenSSL_1_0_0-pre-reformat
    • OpenSSL_1_0_0-pre-auto-reformat
    • OpenSSL_1_0_0-post-reformat
    • OpenSSL_1_0_0-post-auto-reformat
    • OpenSSL_0_9_8zh
    • OpenSSL_0_9_8zg
    • OpenSSL_0_9_8zf
    • OpenSSL_0_9_8ze
    • OpenSSL_0_9_8zd
    • OpenSSL_0_9_8zc
    • OpenSSL_0_9_8zb
    • OpenSSL_0_9_8za
    • OpenSSL_0_9_8y
    • OpenSSL_0_9_8-pre-reformat
    • OpenSSL_0_9_8-pre-auto-reformat
    • OpenSSL_0_9_8-post-reformat
    • OpenSSL_0_9_8-post-auto-reformat
    • OpenSSL-fips-2_0_9
    • OpenSSL-fips-2_0_8
    • OpenSSL-fips-2_0_7
    • OpenSSL-fips-2_0_6
    • OpenSSL-fips-2_0_5
    • OpenSSL-fips-2_0_4
    • OpenSSL-fips-2_0_3
    • OpenSSL-fips-2_0_2
    • OpenSSL-fips-2_0_16
    • OpenSSL-fips-2_0_15
    • OpenSSL-fips-2_0_14
    • OpenSSL-fips-2_0_13
    • OpenSSL-fips-2_0_12
    • OpenSSL-fips-2_0_11
    • OpenSSL-fips-2_0_10
Permalinks

To reference or cite the objects present in the Software Heritage archive, permalinks based on SoftWare Hash IDentifiers (SWHIDs) must be used.
Select below a type of object currently browsed in order to display its associated SWHID and permalink.

  • revision
  • snapshot
revision badge
swh:1:rev:94f416601754dbe65e287f8e1eca01fa32f74a7a
snapshot badge
swh:1:snp:dc2a5002442a00b1c0eda7c65d04ea7455e166cd

sort by:
RevisionAuthorDateMessageCommit Date
a99540a Dr. Stephen Henson28 January 2014, 15:10:27 UTCCheck i before r[i]. PR#3244 (cherry picked from commit 9614d2c676ffe74ce0c919d9e5c0d622a011cbed)28 January 2014, 15:14:47 UTC
9614ed6 Dr. Stephen Henson28 January 2014, 13:51:58 UTCAdd loaded dynamic ENGINEs to list. Always add a dynamically loaded ENGINE to list. Otherwise it can cause problems when multiply loaded, especially if it adds new public key methods. For all current engines we only want a single implementation anyway. (cherry picked from commit e933f91f50108a43c0198cdc63ecdfdbc77b4d0d)28 January 2014, 13:57:14 UTC
aabfee6 Dr. Stephen Henson25 January 2014, 23:20:34 UTCCertificate callback doc. (cherry picked from commit 46ab9bbd7fa610d775fe645dd0fe6d509c8dff3a)28 January 2014, 13:38:55 UTC
cee1d9e Dr. Stephen Henson27 January 2014, 14:59:46 UTCmake update27 January 2014, 14:59:46 UTC
285f7fb Dr. Stephen Henson26 January 2014, 00:51:09 UTCAdd cert callback retry test. (cherry picked from commit 3323314fc1c6d18e650a2de97f7cf9892ac92a60)27 January 2014, 14:41:38 UTC
ede90b1 Dr. Stephen Henson25 January 2014, 13:31:07 UTCSupport retries in certificate callback (cherry picked from commit 0ebc965b9ca4352e407bb7cfa65ac235942117f6) Conflicts: ssl/s3_srvr.c ssl/ssl3.h27 January 2014, 14:41:38 UTC
5e7329d Dr. Stephen Henson26 January 2014, 16:28:27 UTCCompare encodings in X509_cmp as well as hash. (cherry picked from commit ec492c8a5a1491949166c4b37df8666741180f4d)27 January 2014, 14:33:10 UTC
9f1979b Dr. Stephen Henson27 January 2014, 14:30:29 UTCNew function to set compression methods so they can be safely freed. (cherry picked from commit cbb67448277232c8403f96edad4931c4203e7746)27 January 2014, 14:32:44 UTC
3fcf327 Dr. Stephen Henson05 March 2010, 13:28:21 UTCAdd -engine_impl option to dgst which will use an implementation of an algorithm from the supplied engine instead of just the default one. (cherry picked from commit bb845ee044587a91589357a772a02cffb0ba4454)23 January 2014, 18:35:42 UTC
3f4742b Dr. Stephen Henson23 January 2014, 17:13:37 UTCmake update23 January 2014, 17:13:37 UTC
c4f01c5 Dr. Stephen Henson16 January 2014, 14:06:19 UTCAdd new function SSL_CTX_get_ssl_method(). Partial fix for PR#3183. (cherry picked from commit ba168244a14bbd056e502d7daa04cae4aabe9d0d)16 January 2014, 14:08:42 UTC
b7a8550 Kaspar Brand16 January 2014, 13:46:31 UTCOmit initial status request callback check. PR#3178 (cherry picked from commit d0b039d4a3a19b106cc2cb938125b86aca4974aa)16 January 2014, 13:48:23 UTC
e775891 Zoltan Arpadffy11 January 2014, 22:44:04 UTCVMS fixes11 January 2014, 22:44:04 UTC
ae6fbb5 Jeff Trawick10 January 2014, 23:00:50 UTCtypo (cherry picked from commit 5edce5685f26c1bb7854d4cdf291b9604fcc5dbf)10 January 2014, 23:02:46 UTC
f9c1f03 Jeff Trawick10 January 2014, 23:01:30 UTCtypo (cherry picked from commit 4b64e0cbdb563e13a6f7cd8631b31532c04f1234)10 January 2014, 23:02:20 UTC
50701af Dr. Stephen Henson09 January 2014, 22:47:22 UTCFix bug in X509_V_FLAG_IGNORE_CRITICAL CRL handling. (cherry picked from commit 8f4077ca69076cebaca51b7b666db1ed49e46b9e)09 January 2014, 22:53:50 UTC
1d6af3d Dr. Stephen Henson07 January 2014, 15:44:09 UTCupdate NEWS09 January 2014, 22:50:07 UTC
392fd8f Andy Polyakov09 January 2014, 12:44:59 UTCbn/asm/x86_64-mont5.pl: fix compilation error on Solaris. (cherry picked from commit eedab5241e32f9f185cfee23a0c67264d3e3ecf2)09 January 2014, 12:47:53 UTC
802db0f Dr. Stephen Henson07 January 2014, 15:38:15 UTCSync CHANGES07 January 2014, 15:41:11 UTC
2f97241 Dr. Stephen Henson07 January 2014, 15:37:35 UTCAdd fix for CVE-2013-435307 January 2014, 15:41:11 UTC
a05a2c6 Dr. Stephen Henson07 January 2014, 15:26:19 UTCUpdate NEWS.07 January 2014, 15:41:04 UTC
e341406 Andy Polyakov04 January 2014, 17:04:53 UTCsha/asm/sha256-armv4.pl: add NEON code path. (and shave off cycle even from integer-only code) (cherry picked from commit ad0d2579cf3a293a35a5b606afc5a97c71cf6ca7)04 January 2014, 17:06:36 UTC
acd9121 Andy Polyakov04 January 2014, 16:40:13 UTCaesni-sha1-x86_64.pl: harmonize [Atom-specific optimizations] with master branch.04 January 2014, 16:42:13 UTC
b17d6b8 Dr. Stephen Henson04 January 2014, 13:50:52 UTCRestore SSL_OP_MSIE_SSLV2_RSA_PADDING The flag SSL_OP_MSIE_SSLV2_RSA_PADDING hasn't done anything since OpenSSL 0.9.7h but deleting it will break source compatibility with any software that references it. Restore it but #define to zero.04 January 2014, 13:58:51 UTC
b9fa413 Dr. Stephen Henson03 January 2014, 22:38:03 UTCUse algorithm specific chains for certificates. Fix a limitation in SSL_CTX_use_certificate_chain_file(): use algorithm specific chains instead of the shared chain. Update docs. (cherry picked from commit a4339ea3ba045b7da038148f0d48ce25f2996971) Conflicts: CHANGES03 January 2014, 22:45:20 UTC
4abe148 Andy Polyakov03 January 2014, 20:52:49 UTCssl/t1_enc.c: optimize PRF (suggested by Intel). (cherry picked from commit e8b0dd57c0e9c53fd0708f0f458a7a2fd7a95c91)03 January 2014, 20:56:03 UTC
04d6940 Dr. Stephen Henson02 January 2014, 19:12:47 UTCupdate NEWS02 January 2014, 19:12:47 UTC
8511b5f Dr. Stephen Henson24 December 2013, 18:17:00 UTCDon't change version number if session established When sending an invalid version number alert don't change the version number to the client version if a session is already established. Thanks to Marek Majkowski for additional analysis of this issue. PR#3191 (cherry picked from commit b77b58a398c8b9b4113f3fb6b48e162a3b8d4527)02 January 2014, 15:07:51 UTC
546d676 Dr. Stephen Henson24 December 2013, 18:15:28 UTCUpdate curve list size.29 December 2013, 16:30:34 UTC
ccbb8d5 Andy Polyakov28 December 2013, 12:31:14 UTCsparcv9cap.c: omit random detection. PR: 3202 (cherry picked from commit 926725b3d7c1528f2dc116a48623c42264188277)28 December 2013, 12:32:45 UTC
d7d7e7b Andy Polyakov28 December 2013, 11:17:08 UTCARM assembly pack: make it work with older toolchain. (cherry picked from commit 2218c296b4981af6f2639bbd7eabfb89437fe776)28 December 2013, 11:18:11 UTC
80b6d97 Dr. Stephen Henson20 December 2013, 15:26:50 UTCFix DTLS retransmission from previous session. For DTLS we might need to retransmit messages from the previous session so keep a copy of write context in DTLS retransmission buffers instead of replacing it after sending CCS. CVE-2013-6450. (cherry picked from commit 34628967f1e65dc8f34e000f0f5518e21afbfc7b)20 December 2013, 23:25:41 UTC
ff64ab3 Dr. Stephen Henson20 December 2013, 15:12:26 UTCIgnore NULL parameter in EVP_MD_CTX_destroy. (cherry picked from commit a6c62f0c25a756c263a80ce52afbae888028e986)20 December 2013, 23:24:26 UTC
fc9c9e4 Andy Polyakov18 December 2013, 21:12:08 UTCsha1-x86_64.pl: harmonize Win64 SE handlers for SIMD code pathes. (and ensure stack alignment in the process) (cherry picked from commit fc0503a25cd638b93f7af04640c20042e0329b3b)18 December 2013, 21:57:14 UTC
68e6ac4 Andy Polyakov18 December 2013, 20:42:46 UTCevp/e_[aes|camellia].c: fix typo in CBC subroutine. It worked because it was never called. (cherry picked from commit e9c80e04c1a3b5a0de8e666155ab4ecb2697a77d)18 December 2013, 21:56:24 UTC
e34b7e9 Andy Polyakov18 December 2013, 20:27:35 UTCsha512.c: fullfull implicit API contract in SHA512_Transform. SHA512_Transform was initially added rather as tribute to tradition than for practucal reasons. But use was recently found in ssl/s3_cbc.c and it turned to be problematic on platforms that don't tolerate misasligned references to memory and lack assembly subroutine. (cherry picked from commit cdd1acd788020d2c525331da1712ada778f1373c)18 December 2013, 21:56:00 UTC
a32ba49 Dr. Stephen Henson14 December 2013, 13:55:48 UTCCheck EVP errors for handshake digests. Partial mitigation of PR#3200 (cherry picked from commit 0294b2be5f4c11e60620c0018674ff0e17b14238)18 December 2013, 13:27:15 UTC
3a0c715 Dr. Stephen Henson25 February 2010, 00:08:23 UTCverify parameter enumeration functions (cherry picked from commit 9b3d75706ef0114362f04665a3c745bfef59d023) Conflicts: crypto/x509/x509_vpm.c13 December 2013, 15:52:27 UTC
adc6bd7 Dr. Stephen Henson11 December 2013, 14:28:57 UTCAdd opaque ID structure. Move the IP, email and host checking fields from the public X509_VERIFY_PARAM structure into an opaque X509_VERIFY_PARAM_ID structure. By doing this the structure can be modified in future without risk of breaking any applications.13 December 2013, 15:36:31 UTC
8c6d8c2 Dr. Stephen Henson13 December 2013, 14:41:32 UTCBackport TLS padding extension from master.13 December 2013, 15:29:26 UTC
53a8f8c Dr. Stephen Henson13 December 2013, 14:05:32 UTCFix for partial chain notification. For consistency with other cases if we are performing partial chain verification with just one certificate notify the callback with ok==1.13 December 2013, 15:29:26 UTC
bf4863b Dr. Stephen Henson13 December 2013, 13:59:53 UTCVerify parameter retrieval functions. New functions to retrieve internal pointers to X509_VERIFY_PARAM for SSL_CTX and SSL structures.13 December 2013, 15:29:26 UTC
8f68678 Dr. Stephen Henson11 December 2013, 14:45:12 UTCDon't use rdrand engine as default unless explicitly requested.13 December 2013, 15:29:26 UTC
57c4e42 Dr. Stephen Henson10 December 2013, 12:52:27 UTCGet FIPS checking logic right. We need to lock when *not* in FIPS mode.10 December 2013, 12:52:27 UTC
ff672cf Dr. Stephen Henson10 December 2013, 00:10:41 UTCremove obsolete STATUS file10 December 2013, 00:10:41 UTC
d43b040 Dr. Stephen Henson10 December 2013, 00:01:42 UTCAdd release dates to NEWS10 December 2013, 00:08:33 UTC
422c8c3 Andy Polyakov09 December 2013, 22:53:42 UTCARM assembly pack: SHA update from master.09 December 2013, 22:53:42 UTC
b76310b Andy Polyakov09 December 2013, 22:44:45 UTCARM assembly pack: AES update from master (including bit-sliced module).09 December 2013, 22:44:45 UTC
c012f6e Andy Polyakov04 December 2013, 21:37:49 UTCbn/asm/armv4-mont.pl: add NEON code path. (cherry picked from commit d1671f4f1a39d938499c67efe5d4a14c34c09b31)09 December 2013, 21:46:29 UTC
cf6d559 Andy Polyakov09 December 2013, 21:40:53 UTCcrypto/bn/asm/x86_64-mont*.pl: update from master. Add MULX/AD*X code paths and optimize even original code path.09 December 2013, 21:40:53 UTC
3aa1b1c Andy Polyakov02 October 2013, 22:26:09 UTCx86_64-xlate.pl: fix jrcxz in nasm case. (cherry picked from commit 667053a2f3ad0788586f629f618d07b783bdde31)09 December 2013, 21:19:34 UTC
3dcae82 Andy Polyakov09 December 2013, 20:23:19 UTCx86_64-xlate.pl: minor update. (cherry picked from commit 41965a84c4bc0f6694fd17203920a6672e3fac7b)09 December 2013, 20:53:41 UTC
86b81ec Dr. Stephen Henson08 December 2013, 13:19:17 UTCupdate $default_depflags08 December 2013, 13:21:02 UTC
c43dc3d Dr. Stephen Henson04 December 2013, 13:39:04 UTCAvoid multiple locks in FIPS mode. PR: 3176. In FIPS mode ssleay_rand_bytes is only used for PRNG seeding and is performed in either a single threaded context (when the PRNG is first initialised) or under a lock (reseeding). To avoid multiple locks disable use of CRYPTO_LOCK_RAND in FIPS mode in ssleay_rand_bytes.08 December 2013, 13:21:02 UTC
e5eab8a Andy Polyakov03 December 2013, 22:59:55 UTCbn/asm/x86_64-mont5.pl: comply with Win64 ABI. PR: 3189 Submitted by: Oscar Ciurana (cherry picked from commit c5d5f5bd0fe8b2313bec844c0f80f3d49562bfa8)03 December 2013, 23:02:18 UTC
7bab6eb Andy Polyakov03 December 2013, 21:28:48 UTCcrypto/bn/asm/rsaz-x86_64.pl: make it work on Win64. (cherry picked from commit 8bd7ca99961f341ce2070373e86f22505aed2b2a)03 December 2013, 21:30:00 UTC
87d9526 Andy Polyakov03 December 2013, 21:05:17 UTCcrypto/bn/rsaz*: fix licensing note. rsaz_exp.c: harmonize line terminating; asm/rsaz-*.pl: minor optimizations. asm/rsaz-x86_64.pl: sync from master. (cherry picked from commit 31ed9a21315c571db443c68e4f618ecb51c631f9)03 December 2013, 21:17:55 UTC
36982f0 Andy Polyakov03 December 2013, 08:43:06 UTCbn/asm/rsaz-x86_64.pl: fix prototype. (cherry picked from commit 6efef384c6f649399dcc837825a9ca5a37069733)03 December 2013, 08:44:24 UTC
c97ec56 Dr. Stephen Henson01 December 2013, 23:30:21 UTCFix warning.01 December 2013, 23:30:21 UTC
fdb0d5d Dr. Stephen Henson01 December 2013, 23:29:40 UTCChange header order to pick up OPENSSL_SYS_WIN3201 December 2013, 23:29:40 UTC
81b6dfe Dr. Stephen Henson01 December 2013, 23:12:27 UTCRecongnise no-dane and no-libunbound01 December 2013, 23:12:27 UTC
bc35b8e Dr. Stephen Henson01 December 2013, 23:09:44 UTCmake update01 December 2013, 23:09:44 UTC
6859f3f Dr. Stephen Henson01 December 2013, 23:08:13 UTCFix warnings.01 December 2013, 23:08:13 UTC
8b2d5cc Dr. Stephen Henson01 December 2013, 23:07:18 UTCWIN32 fixes.01 December 2013, 23:07:18 UTC
74184b6 Dr. Stephen Henson01 December 2013, 23:06:33 UTCRSAX no longer compiled.01 December 2013, 23:06:33 UTC
6416aed Dr. Stephen Henson27 November 2013, 15:35:02 UTCSimplify and update openssl.spec27 November 2013, 15:35:02 UTC
2a1b7bd Dr. Stephen Henson18 November 2013, 18:49:46 UTCNew functions to retrieve certificate from SSL_CTX New functions to retrieve current certificate or private key from an SSL_CTX. Constify SSL_get_private_key(). (cherry picked from commit a25f9adc778e17568fe2a325e5c3606adb8329f1)18 November 2013, 18:59:18 UTC
4bba0bd Dr. Stephen Henson18 November 2013, 16:52:10 UTCDon't define SSL_select_next_proto if OPENSSL_NO_TLSEXT set (cherry picked from commit 60aeb18750382362ec1c4e1cf05a7222c99ec886)18 November 2013, 18:59:03 UTC
27baa83 Dr. Stephen Henson17 November 2013, 17:48:18 UTCUse correct header length in ssl3_send_certifcate_request (cherry picked from commit fdeaf55bf95e1e2a1e70cca8b68c7d8bbef7c8f0)17 November 2013, 17:50:11 UTC
1abfa78 Dr. Stephen Henson14 November 2013, 21:00:40 UTCConstify.14 November 2013, 21:00:40 UTC
edc687b Piotr Sikora13 November 2013, 23:40:01 UTCFix compilation with no-nextprotoneg. PR#310614 November 2013, 01:20:58 UTC
ff0bdbe Dr. Stephen Henson13 November 2013, 22:57:11 UTCAllow match selecting of current certificate. If pointer comparison for current certificate fails check to see if a match using X509_cmp succeeds for the current certificate: this is useful for cases where the certificate pointer is not available. (cherry picked from commit 6856b288a6e66edd23907b7fa264f42e05ac9fc7)13 November 2013, 23:47:49 UTC
dc4bdf5 Rob Stradling11 November 2013, 17:04:24 UTCAdditional "chain_cert" functions. PR#3169 This patch, which currently applies successfully against master and 1_0_2, adds the following functions: SSL_[CTX_]select_current_cert() - set the current certificate without disturbing the existing structure. SSL_[CTX_]get0_chain_certs() - get the current certificate's chain. SSL_[CTX_]clear_chain_certs() - clear the current certificate's chain. The patch also adds these functions to, and fixes some existing errors in, SSL_CTX_add1_chain_cert.pod. (cherry picked from commit 2f56c9c015dbca45379c9a725915b3b8e765a119)13 November 2013, 23:47:37 UTC
b03d051 Krzysztof Kwiatkowski13 November 2013, 22:45:16 UTCDelete duplicate entry. PR#3172 (cherry picked from commit 4f055e34c3598cad00fca097d812fa3e6436d967)13 November 2013, 23:47:26 UTC
0de7001 Andy Polyakov12 November 2013, 21:09:55 UTCsrp/srp_grps.h: make it Compaq C-friendly. PR: 3165 Submitted by: Daniel Richard G. (cherry picked from commit 2df9ec01d563f9cc2deab07e8c3391059d476592)12 November 2013, 21:19:40 UTC
220d1e5 Andy Polyakov12 November 2013, 20:59:01 UTCmodes/asm/ghash-alpha.pl: update from HEAD. PR: 316512 November 2013, 20:59:01 UTC
ca44f72 Andy Polyakov12 November 2013, 20:49:15 UTCMake Makefiles OSF-make-friendly. PR: 3165 (cherry picked from commit d1cf23ac86c05b22b8780e2c03b67230564d2d34)12 November 2013, 20:53:39 UTC
18f4950 Dr. Stephen Henson11 November 2013, 22:39:40 UTCFix memory leak. (cherry picked from commit 16bc45ba956fdf07c7cda7feda88de597569df63)11 November 2013, 23:55:18 UTC
5c50462 Dr. Stephen Henson11 November 2013, 22:24:08 UTCTypo.11 November 2013, 22:24:08 UTC
a257865 Dr. Stephen Henson08 November 2013, 18:59:26 UTCFix for some platforms where "char" is unsigned. (cherry picked from commit 08b433540416c5bc9a874ba0343e35ba490c65f1)11 November 2013, 22:18:07 UTC
60adefa Andy Polyakov10 November 2013, 22:06:41 UTCMakefile.org: make FIPS build work with BSD make.10 November 2013, 22:06:41 UTC
b5dde6b Dr. Stephen Henson07 November 2013, 15:15:20 UTCCheck for missing components in RSA_check. (cherry picked from commit 01be36ef70525e81fc358d2e559bdd0a0d9427a5)09 November 2013, 15:09:22 UTC
024dbfd Dr. Stephen Henson07 November 2013, 17:27:07 UTCDocument RSAPublicKey_{in,out} options. (cherry picked from commit 7040d73d22987532faa503630d6616cf2788c975)09 November 2013, 15:09:22 UTC
233069f Dr. Stephen Henson07 November 2013, 03:55:49 UTCAdd CMS_SignerInfo_get0_signature function. Add function to retrieve the signature from a CMS_SignerInfo structure: applications can then read or modify it. (cherry picked from commit e8df6cec4c09b9a94c4c07abcf0402d31ec82cc1)09 November 2013, 15:09:22 UTC
c76d692 Andy Polyakov08 November 2013, 22:00:35 UTCengines/ccgost/gost89.h: make word32 defintion unconditional. Original definition depended on __LONG_MAX__ that is not guaranteed to be present. As we don't support platforms with int narrower that 32 bits it's appropriate to make defition inconditional. PR: 3165 (cherry picked from commit 96180cac04591abfe50fc86096365553484bde65)08 November 2013, 22:10:21 UTC
3241496 Andy Polyakov08 November 2013, 21:56:44 UTCmodes/asm/ghash-alpha.pl: make it work with older assembler. PR: 3165 (cherry picked from commit d24d1d7daf515aa19fbf18f6371e3e617028a07c)08 November 2013, 22:10:09 UTC
63fe69c Dr. Stephen Henson06 November 2013, 14:38:28 UTCEnable PSK in FIPS mode. Enable PSK ciphersuites with AES or DES3 in FIPS mode. (cherry picked from commit e0ffd129c16af90eb5e2ce54e57832c0046d1aaf)06 November 2013, 14:39:41 UTC
a4947e4 Dr. Stephen Henson06 November 2013, 13:16:50 UTCInitialise context before using it.06 November 2013, 13:16:50 UTC
262f1c5 Ben Laurie03 November 2013, 17:23:50 UTCPBKDF2 should be efficient. Contributed by Christian Heimes <christian@python.org>.03 November 2013, 17:27:12 UTC
bd80d02 Dr. Stephen Henson02 November 2013, 14:07:21 UTCAdd brainpool curves to trace output.02 November 2013, 14:07:21 UTC
163d794 Dr. Stephen Henson01 November 2013, 21:39:56 UTCFix warning. (cherry picked from commit 96e16bddb42563dc09187939dc20b35369d413b7)02 November 2013, 14:02:00 UTC
0b33466 Dr. Stephen Henson22 October 2013, 06:35:22 UTCAdd SSL_CONF command to set DH Parameters. (cherry picked from commit c557f921dcb20a1bf2ce75e9dc7dd164e59ec3ea)02 November 2013, 13:42:03 UTC
bed27f4 Dr. Stephen Henson22 October 2013, 04:37:10 UTCFix argument processing. (cherry picked from commit abf840e4f71c3a8795428c213fd37ece2a910443)02 November 2013, 13:41:51 UTC
738a224 Dr. Stephen Henson21 October 2013, 06:19:01 UTCConstification. (cherry picked from commit 27f3b65f49ea91fcf4b46ec0298be51b4207214a)02 November 2013, 13:41:38 UTC
044f8ca Dr. Stephen Henson18 October 2013, 15:09:12 UTCExtend SSL_CONF Extend SSL_CONF to return command value types. Add certificate and key options. Update documentation. (cherry picked from commit ec2f7e568ea18a22ab57326fffe78ef2aa6884f5)02 November 2013, 13:41:19 UTC
45ee08d Dr. Stephen Henson17 October 2013, 15:07:27 UTCTypo. (cherry picked from commit 13af1451595b514524b0efc17f99f6392ce090d5)02 November 2013, 13:41:06 UTC
5ff68e8 Piotr Sikora01 November 2013, 21:35:46 UTCFix SSL_OP_SINGLE_ECDH_USE Don't require a public key in tls1_set_ec_id if compression status is not needed. This fixes a bug where SSL_OP_SINGLE_ECDH_USE wouldn't work.01 November 2013, 21:37:46 UTC
f14a4a8 Dr. Stephen Henson01 November 2013, 21:35:00 UTCAdd -ecdh_single option. Add -ecdh_single option to set SSL_OP_SINGLE_ECDH_USE on the command line.01 November 2013, 21:35:00 UTC
f596e3c Robin Seggelmann09 May 2012, 17:28:44 UTCDTLS/SCTP struct authchunks Bug PR: 2809 DTLS/SCTP requires DATA and FORWARD-TSN chunks to be protected with SCTP-AUTH. It is checked if this has been activated successfully for the local and remote peer. Due to a bug, however, the gauth_number_of_chunks field of the authchunks struct is missing on FreeBSD, and was therefore not considered in the OpenSSL implementation. This patch sets the corresponding pointer for the check correctly whether or not this bug is present.30 October 2013, 14:37:22 UTC
9fb523a Robin Seggelmann09 May 2012, 17:28:41 UTCDTLS/SCTP Finished Auth Bug PR: 2808 With DTLS/SCTP the SCTP extension SCTP-AUTH is used to protect DATA and FORWARD-TSN chunks. The key for this extension is derived from the master secret and changed with the next ChangeCipherSpec, whenever a new key has been negotiated. The following Finished then already uses the new key. Unfortunately, the ChangeCipherSpec and Finished are part of the same flight as the ClientKeyExchange, which is necessary for the computation of the new secret. Hence, these messages are sent immediately following each other, leaving the server very little time to compute the new secret and pass it to SCTP before the finished arrives. So the Finished is likely to be discarded by SCTP and a retransmission becomes necessary. To prevent this issue, the Finished of the client is still sent with the old key.30 October 2013, 14:37:22 UTC
  • Newer
  • Older

ENEA — Copyright (C), ENEA. License: GNU AGPLv3+.
Legal notes  ::  JavaScript license information ::  Web API

back to top