- 20 3月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Some CMS SignedData structure use a signature algorithm OID such as SHA1WithRSA instead of the RSA algorithm OID. Workaround this case by tolerating the signature if we recognise the OID.
-
- 19 3月, 2014 1 次提交
-
-
由 Piotr Sikora 提交于
-
- 12 3月, 2014 2 次提交
-
-
由 Dr. Stephen Henson 提交于
Use a previously unused value as we will be updating multiple released branches. (cherry picked from commit 0737acd2a8cc688902b5151cab5dc6737b82fb96)
-
由 Dr. Stephen Henson 提交于
Fix for the attack described in the paper "Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack" by Yuval Yarom and Naomi Benger. Details can be obtained from: http://eprint.iacr.org/2014/140 Thanks to Yuval Yarom and Naomi Benger for discovering this flaw and to Yuval Yarom for supplying a fix. (cherry picked from commit 2198be3483259de374f91e57d247d0fc667aef29) Conflicts: CHANGES
-
- 10 3月, 2014 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 08 3月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
(cherry picked from commit 7a3e67f029969620966b8a627b8485d83692cca5)
-
- 07 3月, 2014 2 次提交
-
-
由 Andy Polyakov 提交于
PR: 3275
-
由 Andy Polyakov 提交于
The problem is that OpenSSH calls EVP_Cipher, which is not as protective as EVP_CipherUpdate. Formally speaking we ought to do more checks in *_cipher methods, including rejecting lengths not divisible by block size (unless ciphertext stealing is in place). But for now I implement check for zero length in low-level based on precedent. PR: 3087, 2775
-
- 06 3月, 2014 3 次提交
-
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
Submitted by: Roumen Petrov
-
由 Andy Polyakov 提交于
Submitted by: Roumen Petrov
-
- 04 3月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
(cherry picked from commit bdfc0e284c89dd5781259cc19aa264aded538492)
-
- 02 3月, 2014 3 次提交
-
-
由 Dr. Stephen Henson 提交于
Add option to set an alternative to the default hmacWithSHA1 PRF for PKCS#8 private key encryptions. This is used automatically by PKCS8_encrypt if the nid specified is a PRF. Add option to pkcs8 utility. Update docs. (cherry picked from commit b60272b01fcb4f69201b3e1659b4f7e9e9298dfb)
-
由 Dr. Stephen Henson 提交于
(cherry picked from commit 124d218889dfca33d277404612f1319afe04107e)
-
由 Dr. Stephen Henson 提交于
Although the memory allocated by compression methods is fixed and cannot grow over time it can cause warnings in some leak checking tools. The function SSL_COMP_free_compression_methods() will free and zero the list of supported compression methods. This should *only* be called in a single threaded context when an application is shutting down to avoid interfering with existing contexts attempting to look up compression methods. (cherry picked from commit 976c58302b13d085edb3ab822f5eac4b2f1bff95)
-
- 01 3月, 2014 1 次提交
-
-
由 Andy Polyakov 提交于
PR: 3271
-
- 27 2月, 2014 5 次提交
-
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
- 26 2月, 2014 7 次提交
-
-
由 Rob Stradling 提交于
-
由 Dr. Stephen Henson 提交于
(cherry picked from commit 3eddd1706a30cdf3dc9278692d8ee9038eac8a0d)
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
PR: 3201
-
由 Andy Polyakov 提交于
-
- 25 2月, 2014 6 次提交
-
-
由 Dr. Stephen Henson 提交于
(cherry picked from commit 3678161d717d0f46c5b5b052a6d6a33438b1df00)
-
由 Dr. Stephen Henson 提交于
Not all platforms define BN_ULLONG. Define SCTS_TIMESTAMP as a type which should work on all platforms. (cherry picked from commit 6634416732b94627eba1c47de3c3a6321a5458f0)
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
Windows 8 SDKs complain that GetVersion() is deprecated. We only use GetVersion like this: (GetVersion() < 0x80000000) which checks if the Windows version is NT based. Use a macro check_winnt() which uses GetVersion() on older SDK versions and true otherwise.
-
由 Rob Stradling 提交于
-
由 Andy Polyakov 提交于
Allegedly formwarding to NUL: sometimes creates NUL file in file system. PR: 3250
-
- 24 2月, 2014 3 次提交
-
-
由 Andy Polyakov 提交于
PR: 3251 Suggested by: Thorsten Schning
-
由 Andy Polyakov 提交于
when adding duplicates in add_cert_dir. PR: 3261 Reported by: Marian Done
-
由 Andy Polyakov 提交于
-
- 23 2月, 2014 2 次提交
-
-
由 Dr. Stephen Henson 提交于
When setting the current certificate check that it has a corresponding private key.
-
由 Dr. Stephen Henson 提交于
New flags to build certificate chains. The can be used to rearrange the chain so all an application needs to do is add all certificates in arbitrary order and then build the chain to check and correct them. Add verify error code when building chain. Update docs.
-