summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
* update FAQOpenSSL_0_9_8xDr. Stephen Henson2012-05-101-1/+1
* prepare for 0.9.8x releaseDr. Stephen Henson2012-05-104-6/+7
* update NEWSDr. Stephen Henson2012-05-101-0/+4
* Sanity check record length before skipping explicit IV in DTLSDr. Stephen Henson2012-05-102-1/+9
* Reported by: Solar Designer of OpenwallDr. Stephen Henson2012-05-102-3/+5
* Correct environment variable is OPENSSL_ALLOW_PROXY_CERTS.Richard Levitte2012-05-041-1/+1
* prepare for next versionDr. Stephen Henson2012-04-234-5/+9
* update STATUSOpenSSL_0_9_8wDr. Stephen Henson2012-04-231-1/+6
* correct STATUSDr. Stephen Henson2012-04-231-2/+2
* correct NEWSDr. Stephen Henson2012-04-231-1/+1
* prepare form 0.9.8w releaseDr. Stephen Henson2012-04-234-6/+7
* update NEWSDr. Stephen Henson2012-04-231-0/+4
* The fix for CVE-2012-2110 did not take into account that theDr. Stephen Henson2012-04-232-1/+15
* correct error codeDr. Stephen Henson2012-04-221-1/+1
* correct old FAQ answers, sync with HEADDr. Stephen Henson2012-04-221-3/+19
* prepare for next versionDr. Stephen Henson2012-04-194-5/+9
* update FAQOpenSSL_0_9_8vDr. Stephen Henson2012-04-191-1/+1
* prepare for 0.9.8v releaseDr. Stephen Henson2012-04-194-6/+7
* update NEWSDr. Stephen Henson2012-04-191-0/+4
* Check for potentially exploitable overflows in asn1_d2i_read_bioDr. Stephen Henson2012-04-194-15/+69
* use /fixed argument when linking FIPS targets to disable address space layout...Dr. Stephen Henson2012-04-151-2/+2
* PR: 2778(part)Dr. Stephen Henson2012-03-311-1/+1
* Always use SSLv23_{client,server}_method in s_client.c and s_server.c,Dr. Stephen Henson2012-03-183-643/+613
* prepare for next versionDr. Stephen Henson2012-03-124-5/+9
* corrected fix to PR#2711 and also cover mime_param_cmpOpenSSL_0_9_8uDr. Stephen Henson2012-03-121-3/+4
* correct FAQDr. Stephen Henson2012-03-121-1/+1
* prepare for releaseDr. Stephen Henson2012-03-124-6/+7
* update NEWSDr. Stephen Henson2012-03-121-0/+6
* Fix for CMS/PKCS7 MMA. If RSA decryption fails use a random key andDr. Stephen Henson2012-03-128-40/+160
* fix error codeDr. Stephen Henson2012-03-123-1/+3
* manually patch missing part of PR#2756Dr. Stephen Henson2012-03-121-5/+0
* PR: 2756Dr. Stephen Henson2012-03-093-21/+30
* check return value of BIO_write in PKCS7_decryptDr. Stephen Henson2012-03-081-1/+5
* PR: 2755Dr. Stephen Henson2012-03-074-2/+11
* return failure code if I/O errorDr. Stephen Henson2012-03-061-1/+1
* revert PR#2755: it breaks compilationDr. Stephen Henson2012-03-064-29/+2
* PR: 2755Dr. Stephen Henson2012-03-064-2/+29
* PR: 2696 Submitted by: Rob Austein <sra@hactrn.net>Dr. Stephen Henson2012-03-061-8/+55
* oops, revert unrelated patchesDr. Stephen Henson2012-03-062-57/+13
* PR: 2748Dr. Stephen Henson2012-03-064-18/+61
* Fix memory leak cause by race condition when creating public keys.Dr. Stephen Henson2012-02-281-1/+10
* free headers after use in error messageDr. Stephen Henson2012-02-271-1/+1
* Detect symmetric crypto errors in PKCS7_decrypt.Dr. Stephen Henson2012-02-271-2/+17
* PR: 2711Dr. Stephen Henson2012-02-231-0/+4
* Fix bug in CVE-2011-4619: check we have really received a client helloDr. Stephen Henson2012-02-162-9/+11
* PR: 2703Dr. Stephen Henson2012-02-111-1/+7
* PR: 2705Dr. Stephen Henson2012-02-111-17/+25
* fix Visual Studio 2010 warning [from HEAD] (original by appro)Dr. Stephen Henson2012-01-201-1/+2
* prepare for next versionDr. Stephen Henson2012-01-184-5/+9
* update FAQOpenSSL_0_9_8tDr. Stephen Henson2012-01-181-1/+1