- 11 5月, 2012 6 次提交
-
-
由 Dr. Stephen Henson 提交于
Reported by: Constantine Sapuntzakis <csapuntz@gmail.com> Fix possible deadlock when decoding public keys.
-
由 Dr. Stephen Henson 提交于
Reported by: Phil Pennock <openssl-dev@spodhuis.org> Make renegotiation work for TLS 1.2, 1.1 by not using a lower record version client hello workaround if renegotiating.
-
由 Ben Laurie 提交于
-
由 Ben Laurie 提交于
-
由 Dr. Stephen Henson 提交于
Submitted by: PK <runningdoglackey@yahoo.com> Correct ciphersuite signature algorithm definitions.
-
由 Dr. Stephen Henson 提交于
DTLS to fix DoS attack. Thanks to Codenomicon for discovering this issue using Fuzz-o-Matic fuzzing as a service testing platform. (CVE-2012-2333)
-
- 10 5月, 2012 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
Make sure tkeylen is initialised properly when encrypting CMS messages.
-
- 04 5月, 2012 1 次提交
-
-
由 Richard Levitte 提交于
-
- 28 4月, 2012 2 次提交
-
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
of digest algorithms, mosty SHA, on Power7. Mystery of century, why SHA, why slower algorithm are affected more... PR: 2794 Submitted by: Ashley Lai
-
- 27 4月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 26 4月, 2012 6 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
由 Dr. Stephen Henson 提交于
OpenSSL 1.0.0. Add CHANGES entry noting the consequences.
-
由 Andy Polyakov 提交于
vector contiguous. PR: 2802
-
- 24 4月, 2012 3 次提交
-
-
由 Dr. Stephen Henson 提交于
Reviewed by: steve Improved localisation of TLS extension handling and code tidy.
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 23 4月, 2012 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 22 4月, 2012 4 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
Submitted by: Dominik Oepen <oepen@informatik.hu-berlin.de> Add Brainpool curves from RFC5639. Original patch by Annie Yousar <a.yousar@informatik.hu-berlin.de>
-
- 20 4月, 2012 2 次提交
-
-
由 Andy Polyakov 提交于
PR: 2792
-
由 Dr. Stephen Henson 提交于
BUF_mem_grow and BUF_mem_grow_clean. Refuse attempts to shrink buffer in CRYPTO_realloc_clean. Thanks to Tavis Ormandy, Google Security Team, for discovering this issue and to Adam Langley <agl@chromium.org> for fixing it. (CVE-2012-2110)
-
- 19 4月, 2012 3 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Andy Polyakov 提交于
PR: 2793
-
由 Dr. Stephen Henson 提交于
-
- 18 4月, 2012 4 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Andy Polyakov 提交于
e_aes_cbc_hmac_sha1.c (mostly for aesthetic reasons).
-
由 Andy Polyakov 提交于
PR: 2792
-
由 Andy Polyakov 提交于
tested, because kernel is not in shape to handle it *yet*. The code is committed mostly to stimulate the kernel development.
-
- 17 4月, 2012 5 次提交
-
-
由 Bodo Möller 提交于
(TLS 1.2 clients could end up negotiating these with an OpenSSL server with TLS 1.2 disabled, which is problematic.) Submitted by: Adam Langley
-
由 Dr. Stephen Henson 提交于
If OPENSSL_MAX_TLS1_2_CIPHER_LENGTH is set then limit the size of client ciphersuites to this value. A value of 50 should be sufficient. Document workarounds in CHANGES.
-
由 Dr. Stephen Henson 提交于
Some servers hang when presented with a client hello record length exceeding 255 bytes but will work with longer client hellos if the TLS record version in client hello does not exceed TLS v1.0. Unfortunately this doesn't fix all cases...
-
由 Andy Polyakov 提交于
PR: 2791 Submitted by: Ben Noordhuis
-
由 Andy Polyakov 提交于
PR: 2790 Submitted by: Alexei Khlebnikov
-