- 19 7月, 2010 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 01 6月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 06 5月, 2010 1 次提交
-
-
由 Andy Polyakov 提交于
be done, it's definitely not the way to do it. So far answer to the question was to ./config -Wa,--noexecstack (adopted by RedHat).
-
- 05 5月, 2010 1 次提交
-
-
由 Ben Laurie 提交于
-
- 15 4月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 07 4月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
directly by SSL/TLS SHA2 certificates are becoming more common and applications that only call SSL_library_init() and not OpenSSL_add_all_alrgorithms() will fail when verifying certificates. Update docs.
-
- 25 3月, 2010 1 次提交
-
-
由 Bodo Möller 提交于
Also, add missing CHANGES entry for CVE-2009-3245 (code changes submitted to this branch on 23 Feb 2010), and further harmonize this version of CHANGES with the versions in the current branches.
-
- 14 3月, 2010 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 12 3月, 2010 1 次提交
-
-
由 Mark J. Cox 提交于
security relevent we'd better list it.
-
- 11 3月, 2010 3 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 09 3月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
requests. Add new ASN1 signature initialisation function to handle this case.
-
- 07 3月, 2010 2 次提交
-
-
由 Dr. Stephen Henson 提交于
Uses ASN1 module in Martin Kaiser's PSS patch.
-
由 Dr. Stephen Henson 提交于
now print out signatures instead of the standard hex dump. More complex signatures (e.g. PSS) can print out more meaningful information. Sample DSA version included that prints out the signature parameters r, s. [Note EVP_PKEY_ASN1_METHOD is an application opaque structure so adding new fields in the middle has no compatibility issues]
-
- 03 3月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Fix for CVE-2010-0433 where some kerberos enabled versions of OpenSSL could be crashed if the relevant tables were not present (e.g. chrooted).
-
- 26 2月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 25 2月, 2010 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
certificate is explicitly trusted (using -addtrust option to x509 utility for example) the verification is sucessful even if the chain is not complete.
-
- 20 2月, 2010 1 次提交
-
-
由 Bodo Möller 提交于
-
- 18 2月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
initial connection to unpatched servers. There are no additional security concerns in doing this as clients don't see renegotiation during an attack anyway.
-
- 17 2月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: James Baker <jbaker@tableausoftware.com> et al. Workaround for slow Heap32Next on some versions of Windows.
-
- 13 2月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 08 2月, 2010 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 07 2月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
an EVP_CIPHER_CTX structure which may have problems with external ENGINEs who need to duplicate internal handles etc.
-
- 29 1月, 2010 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 27 1月, 2010 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
Submitted by: steve@openssl.org More robust fix and workaround for PR#1949. Don't try to work out if there is any write pending data as this can be unreliable: always flush.
-
- 26 1月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 23 1月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 14 1月, 2010 2 次提交
-
-
由 Dr. Stephen Henson 提交于
Although it will be many years before TLS v2.0 or later appears old versions of servers have a habit of hanging around for a considerable time so best if we handle this properly now.
-
由 Dr. Stephen Henson 提交于
stops applications that call CRYPTO_free_all_ex_data() prematurely leaking memory.
-
- 13 1月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Willy Weisz <weisz@vcpc.univie.ac.at> Add options to output hash using older algorithm compatible with OpenSSL versions before 1.0.0
-
- 07 1月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
1. Add provisional SCSV value. 2. Don't send SCSV and RI at same time. 3. Fatal error is SCSV received when renegotiating.
-
- 31 12月, 2009 2 次提交
-
-
由 Dr. Stephen Henson 提交于
used compression algorithms in client hello (a legacy from when the compression algorithm wasn't serialized with SSL_SESSION).
-
由 Dr. Stephen Henson 提交于
-