https://github.com/openssl/openssl

sort by:
Revision Author Date Message Commit Date
94f4166 Prepare for 1.0.2-beta1 release 24 February 2014, 13:51:34 UTC
a74c9c9 OpenSSL 1.0.2 is now in beta 24 February 2014, 13:50:38 UTC
d2a3c44 make update 24 February 2014, 13:50:38 UTC
a129850 config: recognize ARMv8/AArch64 target. (cherry picked from commit d099f0ed6ca518052bb167b31e999e1e7734eebf) 24 February 2014, 12:21:14 UTC
c3f5d3d Only set current certificate to valid values. When setting the current certificate check that it has a corresponding private key. (cherry picked from commit 358d352aa244b4f2ef655bccff6658d92d5ce03c) 23 February 2014, 13:49:21 UTC
c5ea65b New chain building flags. New flags to build certificate chains. The can be used to rearrange the chain so all an application needs to do is add all certificates in arbitrary order and then build the chain to check and correct them. Add verify error code when building chain. Update docs. (cherry picked from commit 13dc3ce9ab483cade378bcf3844c92bacd817316) 23 February 2014, 13:49:21 UTC
58b86e4 Option to set current cert to server certificate. (cherry picked from commit daddd9a950e491c31f9500d5e570bc7eb96b2823) 23 February 2014, 13:49:21 UTC
a466be6 Fix typo. 23 February 2014, 11:21:39 UTC
60327ce Add debug flag. 23 February 2014, 11:21:28 UTC
2d4d962 aes/asm/aesni-x86[_64].pl: minor Atom-specific performance tweak. (cherry picked from commit 214368ffee5736836e2dbb80a16a4fbd85f0eaf9) 21 February 2014, 11:15:07 UTC
6b3b6be ssl/ssl_cert.c: DANE update. 21 February 2014, 11:12:25 UTC
7743be3 make update 20 February 2014, 22:57:24 UTC
b709f8e fix WIN32 warnings 20 February 2014, 22:41:06 UTC
c74ce24 Show the contents of the RFC6962 Signed Certificate Timestamp List Certificate/OCSP Extensions. Add the RFC6962 OIDs to the objects table. (backport from master branch) 20 February 2014, 21:43:54 UTC
612566e Don't use CRYPTO_AES_CTR if it isn't defined. (cherry picked from commit 6ecbc2bb62835a401ad6efe240d469a23b21755b) 18 February 2014, 22:21:41 UTC
3ecce3d Don't use getcwd in non-copy builds. (cherry picked from commit f3a39032601fab2c704f03338e378592d3b4e262) 15 February 2014, 20:17:59 UTC
71eca86 Don't override $srcd for non copy builds. 15 February 2014, 20:16:13 UTC
dd1e3bd recognise multiblock 15 February 2014, 18:19:35 UTC
c55fef7 Add /fixed flag for FIPS links where appropriate. 15 February 2014, 17:16:19 UTC
eb70d44 Remove duplicate statement. (cherry picked from commit 5a7652c3e585e970e5b778074c92e617e48fde38) 15 February 2014, 01:29:24 UTC
b335b54 Add support for aes-128/192/256-ctr to the cryptodev engine. This can be used to speed up SRTP with libsrtp, e.g. on TI omap/sitara based devices. (cherry picked from commit be2c4d9bd9e81030c547a34216ae2d8e5c888190) 15 February 2014, 00:06:43 UTC
a8eeedb Use defaults bits in req when not given If you use "-newkey rsa" it's supposed to read the default number of bits from the config file. However the value isn't used to generate the key, but it does print it's generating such a key. The set_keygen_ctx() doesn't call EVP_PKEY_CTX_set_rsa_keygen_bits() and you end up with the default set in pkey_rsa_init() (1024). Afterwards the number of bits gets read from the config file, but nothing is done with that anymore. We now read the config first and use the value from the config file when no size is given. PR: 2592 (cherry picked from commit 3343220327664680420d4068e1fbe46d2236f1b0) 14 February 2014, 22:35:15 UTC
b3d8de7 Fix additional pod errors with numbered items. (cherry picked from commit e547c45f1c74e976656c042ec9d873f6eea0e756) 14 February 2014, 22:35:15 UTC
0413ea5 Fix various spelling errors (cherry picked from commit 2b4ffc659eabec29f76821f0ac624a2b8c19e4c7) 14 February 2014, 22:35:15 UTC
2f6fba6 Document pkcs12 -password behavior apps/pkcs12.c accepts -password as an argument. The document author almost certainly meant to write "-password, -passin". However, that is not correct, either. Actually the code treats -password as equivalent to -passin, EXCEPT when -export is also specified, in which case -password as equivalent to -passout. (cherry picked from commit 856c6dfb09d69fc82ada2611c6cd792dfc60e355) 14 February 2014, 22:35:15 UTC
d69acce Fix error discrepancy with 1.0.1 14 February 2014, 17:50:20 UTC
aff78bb ssl/s3_pkt.c: detect RAND_bytes error in multi-block. (cherry picked from commit 701134320a94908d8c0ac513741cab41e215a7b5) 14 February 2014, 16:45:33 UTC
104c032 x86[_64]cpuid.pl: add low-level RDSEED. (cherry picked from commit f4d456408d9d7bca31f34765d1a05fbd9fa55826) 14 February 2014, 16:25:14 UTC
b347341 aes/asm/aesni-x86_64.pl: further optimization for Atom Silvermont. Improve CBC decrypt and CTR by ~13/16%, which adds up to ~25/33% improvement over "pre-Silvermont" version. [Add performance table to aesni-x86.pl]. (cherry picked from commit 5599c7331b90d9d29c9914c2a95c16d91485415a) 14 February 2014, 16:17:39 UTC
c00f8d6 Include self-signed flag in certificates by checking SKID/AKID as well as issuer and subject names. Although this is an incompatible change it should have little impact in pratice because self-issued certificates that are not self-signed are rarely encountered. (cherry picked from commit b1efb7161f409c81178b9aa95583db3390f90b1b) 14 February 2014, 15:27:30 UTC
b07e4f2 Include TA in checks/callback with partial chains. When a chain is complete and ends in a trusted root checks are also performed on the TA and the callback notified with ok==1. For consistency do the same for chains where the TA is not self signed. (cherry picked from commit 385b3486661628f3f806205752bf968b8114b347) 14 February 2014, 15:12:53 UTC
ced6dc5 Add cert_self_signed function to simplify verify (from master) 14 February 2014, 15:12:52 UTC
bf2d129 Simplify X509_STORE_CTX_get1_chain (from master). 14 February 2014, 15:12:52 UTC
d59d0b7 ssl/ssl[3].h: retain binary compatibility. 13 February 2014, 16:03:14 UTC
dbd512e Configure: restore binary compatibility in darwin64-x86_64-cc. (and remove duplicates). 13 February 2014, 14:23:36 UTC
fcc6f69 evp/e_aes_cbc_hmac_sha*.c: improve cache locality. (cherry picked from commit 9587429fa07a34066107e926fbc8708220f058fa) 13 February 2014, 13:41:10 UTC
7078d93 ghash-x86[_64].pl: ~15% improvement on Atom Silvermont (other processors unaffected). (cherry picked from commit 98e143f118aedc2fa79fa0ae90f1b039da106309) 13 February 2014, 13:38:59 UTC
a2317c3 fix error discrepancy 09 February 2014, 21:12:12 UTC
75917fa Make upate. Revert libssl ordinals to OpenSSL 1.0.1 values first to tidy up and avoid entries for deleted functions. 09 February 2014, 19:59:54 UTC
295fd05 fix error number clash 09 February 2014, 19:57:27 UTC
8c4e09f Whitespace fixes. 09 February 2014, 19:31:07 UTC
e32cbae Merge branch '102_stable_tlsext_suppdata_changes' of git://github.com/scottdeboy/openssl into scottdeboy-102_stable_tlsext_suppdata_changes 09 February 2014, 19:17:42 UTC
f6fd8db Restore copyright symbol - ISO-8859-1 encoding for Configure file 09 February 2014, 16:26:04 UTC
d65db21 Const fix. 09 February 2014, 16:07:16 UTC
8acf1ff More cleanup. (cherry picked from commit 5eda213ebe382009c2f37a8eade5cbcdae6017ed) Conflicts: apps/s_client.c apps/s_server.c 09 February 2014, 16:07:04 UTC
8b41df4 Make it build. (cherry picked from commit a6a48e87bc469f37ed1c53d0e4d22faaa0a5adf3) Conflicts: ssl/s3_clnt.c ssl/t1_lib.c 09 February 2014, 16:02:40 UTC
c32ebef Reverting 1.0.2-only changes supporting the prior authz RFC5878-based tests from commit 835d104f46c4448a27844a9309de456c7972a943 09 February 2014, 15:49:44 UTC
ed0dc93 Add new asm modules. 09 February 2014, 12:18:16 UTC
5a32dd8 Don't break out of the custom extension callback loop - continue instead The contract for custom extension callbacks has changed - all custom extension callbacks are triggered 09 February 2014, 00:19:30 UTC
130ebe3 Fix whitespace, new-style comments. 09 February 2014, 00:19:30 UTC
7612511 Re-add alert variables removed during rebase Whitespace fixes (cherry picked from commit e9add063b50e8a460d5636055156d2760c2fe29f) Conflicts: ssl/s3_clnt.c 09 February 2014, 00:19:01 UTC
19a28a8 Updating DTCP authorization type to expected value 09 February 2014, 00:18:11 UTC
fc21321 Update custom TLS extension and supplemental data 'generate' callbacks to support sending an alert. If multiple TLS extensions are expected but not received, the TLS extension and supplemental data 'generate' callbacks are the only chance for the receive-side to trigger a specific TLS alert during the handshake. Removed logic which no-op'd TLS extension generate callbacks (as the generate callbacks need to always be called in order to trigger alerts), and updated the serverinfo-specific custom TLS extension callbacks to track which custom TLS extensions were received by the client, where no-ops for 'generate' callbacks are appropriate. (cherry picked from commit ac20719d994729970eb3b775c7bffa81f0e9f960) Conflicts: ssl/t1_lib.c 09 February 2014, 00:17:24 UTC
7198c5a Redo deletion of some serverinfo code that supplemental data code mistakenly reinstated. 09 February 2014, 00:15:10 UTC
40632f6 Free generated supp data after handshake completion, add comment regarding use of num_renegotiations in TLS and supp data generation callbacks (cherry picked from commit 67c408cee9b01a7c8c7ca002d36b4f8c0612b08c) Conflicts: apps/s_client.c apps/s_server.c 09 February 2014, 00:14:23 UTC
038bec7 Add callbacks supporting generation and retrieval of supplemental data entries, facilitating RFC 5878 (TLS auth extensions) Removed prior audit proof logic - audit proof support was implemented using the generic TLS extension API Tests exercising the new supplemental data registration and callback api can be found in ssltest.c. Implemented changes to s_server and s_client to exercise supplemental data callbacks via the -auth argument, as well as additional flags to exercise supplemental data being sent only during renegotiation. (cherry picked from commit 36086186a9b90cdad0d2cd0a598a10f03f8f4bcc) Conflicts: Configure apps/s_client.c apps/s_server.c ssl/ssl.h ssl/ssl3.h ssl/ssltest.c 09 February 2014, 00:12:15 UTC
f407eec make update 06 February 2014, 14:31:09 UTC
bd618be update default depflags 06 February 2014, 14:28:49 UTC
e2884b3 Configure: recognize experimental-multiblock. (cherry picked from commit 2d752737c53d0cf4953c11551d6d2a9df3655329) 06 February 2014, 14:26:01 UTC
c41e242 Return previous compression methods when setting them. (cherry picked from commit b45e874d7c4a8fdac7ec10cff43f21d02e75d511) 06 February 2014, 13:58:18 UTC
9578319 ssl/s3_pkt.c: add multi-block processing [from master]. 05 February 2014, 20:43:17 UTC
16eaca2 config: recognize little-endian Linux PPC64. 05 February 2014, 19:36:11 UTC
3bff195 Oops, get selection logic right. (cherry picked from commit 3880579240d476d21f68fd01a391dd325920f479) 05 February 2014, 18:57:23 UTC
41cf2d2 evp/e_aes_cbc_hmac_sha[1|256].c: add multi-block implementations [from master]. 05 February 2014, 18:52:38 UTC
e0d4272 Return per-certificate chain if extra chain is NULL. If an application calls the macro SSL_CTX_get_extra_chain_certs return either the old "shared" extra certificates or those associated with the current certificate. This means applications which call SSL_CTX_use_certificate_chain_file and retrieve the additional chain using SSL_CTX_get_extra_chain_certs will still work. An application which only wants to check the shared extra certificates can call the new macro SSL_CTX_get_extra_chain_certs_only (cherry picked from commit a51f767645c117667d337f77fe1dd9c0a66d8410) 05 February 2014, 17:06:56 UTC
41c373f [aesni|sha*]-mb-x86_64.pl: add multi-block assembly modules [from master]. 05 February 2014, 13:33:44 UTC
7f6e09b Add quotes as CC can contain spaces. PR#3253 03 February 2014, 14:13:04 UTC
e2f0680 New ctrl to set current certificate. New ctrl sets current certificate based on certain criteria. Currently two options: set the first valid certificate as current and set the next valid certificate as current. Using these an application can iterate over all certificates in an SSL_CTX or SSL structure. (cherry picked from commit 0f78819c8ccb7c526edbe90d5b619281366ce75c) 02 February 2014, 23:12:06 UTC
1180833 Fix various typos. (cherry picked from commit f3efeaad540b000779277b4fc49a239529ee616e) 02 February 2014, 23:12:06 UTC
130eed0 Update demo. (cherry picked from commit 88c21c47a3d187d4f8c4e87e3c6088198cb08a99) 02 February 2014, 23:06:16 UTC
2ded873 Update demos/bio/README (cherry picked from commit ea131a0644bcebeaa5e911217aadbc9dac241fec) 02 February 2014, 23:05:52 UTC
b1ae02e Modify sample accept.cnf (cherry picked from commit d80b0eeee59fa48f2506fe103de1b52ef6de3f4f) 02 February 2014, 23:05:34 UTC
3814170 Add demo for SSL server using SSL_CONF. (cherry picked from commit ebd14bfce9ef6b4bf41129a329823130d1002f42) 02 February 2014, 23:05:15 UTC
984a304 Add extension free function. 02 February 2014, 15:22:47 UTC
2ad673c engines/e_capi.c: TCHAR support (cumilative update from master). 01 February 2014, 23:17:38 UTC
0693dd9 modes/asm/ghash-s390x.pl: +15% performance improvement on z10. (cherry picked from commit d162584b1154153d997fed18a9df2e60771fe06c) 01 February 2014, 23:10:41 UTC
9071b36 Add AES-NI+SHA256 stitch registrations (from master). 01 February 2014, 23:05:02 UTC
eb6af20 dso/dso_win32.c: fix compiler warning. (cherry picked from commit 0a2d5003df1a9ecf801ac3b4a5cb7dda85449315) 01 February 2014, 22:32:19 UTC
8087969 crypto/cryptlib.c: remove stdio dependency (update from master). 01 February 2014, 22:27:49 UTC
cb437c6 camellia/asm/cmll-x86_64.pl: fix symptomless bugs (update from master). 01 February 2014, 22:14:33 UTC
40b0d07 Remove redundant accessor (you can do the same thing, and more, with X509_ALGOR_[gs]et0()). 01 February 2014, 22:03:40 UTC
41235f3 util/pl/VC-32.pl fix typo. (cherry picked from commit fb0a520897778ebeebe9aaaf116f207a838ebb3f) 01 February 2014, 21:55:25 UTC
130c15e util/pl/VC-32.pl: refresh, switch to ws2, add crypt32, fix typo (based on suggestions from Pierre Delaage). (cherry picked from commit 668bcfd5ca237fdf6fbef1ab463697a4a48caf39) Resolved conflicts: util/pl/VC-32.pl 01 February 2014, 21:53:24 UTC
2cc5142 Improve WINCE support. Submitted by: Pierre Delaage (cherry picked from commit a006fef78e56b078549a80f4bb4518b6a02eba84) Resolved conflicts: crypto/bio/bss_dgram.c ssl/d1_lib.c util/pl/VC-32.pl 01 February 2014, 21:48:56 UTC
d451ece b_sock.c: make getsockopt work in cases when optlen is 64-bit value. (cherry picked from commit 80c42f3e0c34451dd7cfc65e07bc639759ef07d2) 01 February 2014, 21:33:02 UTC
1121ba1 wp-mmx.pl: ~10% performance improvement. (cherry picked from commit ae007d4d09f2ed9940c6e581bab9290d78615506) 01 February 2014, 21:27:07 UTC
1fb039f wp-x86_64.pl: ~10% performance improvement. (cherry picked from commit 701d593f7095db84459c76265349a83d30a4cae5) 01 February 2014, 21:26:45 UTC
3073927 sha512-ia64.pl: 15-20% performance improvement. (cherry picked from commit 46a2b3387a3feb044527a58a89555029c809190d) 01 February 2014, 21:21:57 UTC
b6c2029 objxref.pl: improve portability. (cherry picked from commit 71fa3bc5ece9121d1aa9bb513b5641e9ea605e14) 01 February 2014, 21:17:36 UTC
45d0102 Add volatile qualifications to two blocks of inline asm to stop GCC from eliminating them as dead code. Both volatile and "memory" are used because of some concern that the compiler may still cache values across the asm block without it, and because this was such a painful debugging session that I wanted to ensure that it's never repeated. (cherry picked from commit 7753a3a68431aa81b82beea4c3f5374b41454679) 01 February 2014, 21:01:46 UTC
7e56902 PPC assembly pack: ppc64-mont update from master. 01 February 2014, 20:51:51 UTC
50f1b47 PPC assembly pack: jumbo update from master. Add Vector Permutation AES and little-endian support. 01 February 2014, 20:48:31 UTC
5572bc4 crypto/aes/asm/aesni-x86[_64].pl: jumbo update from master. 01 February 2014, 20:27:46 UTC
729d334 crypto/sha/asm/sha1-x86_64.pl: jumbo update from master. 01 February 2014, 20:24:55 UTC
cacdfcb Add more accessors. 01 February 2014, 18:30:23 UTC
519ad9b Add accessor for x509.cert_info. 01 February 2014, 18:30:23 UTC
7b2d785 Fix warning. 29 January 2014, 16:57:32 UTC
f2d678e Clarify docs. Remove reference to ERR_TXT_MALLOCED in the error library as that is only used internally. Indicate that returned error data must not be freed. 29 January 2014, 00:59:35 UTC
448e9b7 typo (cherry picked from commit cb2182676bdf652070bc272a3896d957763a4324) 28 January 2014, 15:36:15 UTC
2c4c986 Fix demo comment: 0.9.9 never released. (cherry picked from commit 717cc8589540b95122a652dee68e6a75b6262d93) 28 January 2014, 15:17:32 UTC
back to top