summaryrefslogtreecommitdiff
path: root/CHANGES
Commit message (Expand)AuthorAgeFilesLines
* Update CHANGES.Rob Stradling2013-09-161-1/+7
* Sync CHANGES and NEWS files.Bodo Moeller2013-09-161-1/+138
* update CHANGESDr. Stephen Henson2013-02-111-1/+3
* prepare for next versionDr. Stephen Henson2013-02-111-0/+4
* prepare for releaseDr. Stephen Henson2013-02-111-1/+1
* prepare for next versionDr. Stephen Henson2013-02-061-0/+4
* typoOpenSSL_1_0_1dDr. Stephen Henson2013-02-041-1/+1
* typoDr. Stephen Henson2013-02-041-2/+2
* Add CHANGES entries.Dr. Stephen Henson2013-02-041-0/+21
* Don't try and verify signatures if key is NULL (CVE-2013-0166)Dr. Stephen Henson2013-01-291-0/+4
* Make verify return errors.Ben Laurie2012-12-131-0/+3
* Call OCSP Stapling callback after ciphersuite has been chosen, so theBen Laurie2012-09-171-0/+6
* PR: 2813Dr. Stephen Henson2012-05-111-0/+3
* PR: 2811Dr. Stephen Henson2012-05-111-1/+3
* prepare for next versionDr. Stephen Henson2012-05-101-0/+4
* prepare for 1.0.1c releaseOpenSSL_1_0_1cDr. Stephen Henson2012-05-101-1/+1
* Sanity check record length before skipping explicit IV in TLS 1.2, 1.1 andDr. Stephen Henson2012-05-101-0/+8
* Reported by: Solar Designer of OpenwallDr. Stephen Henson2012-05-101-0/+4
* Don't try to use unvalidated composite ciphers in FIPS modeDr. Stephen Henson2012-04-261-1/+3
* prepare for next versionDr. Stephen Henson2012-04-261-0/+4
* prepare for 1.0.1b releaseDr. Stephen Henson2012-04-261-1/+1
* CHANGES: clarify.Andy Polyakov2012-04-261-1/+2
* CHANGEs: fix typos and clarify.Andy Polyakov2012-04-261-3/+5
* Change value of SSL_OP_NO_TLSv1_1 to avoid clash with SSL_OP_ALL andDr. Stephen Henson2012-04-251-0/+11
* s23_clnt.c: ensure interoperability by maitaining client "version capability"Andy Polyakov2012-04-251-1/+7
* update for next versionDr. Stephen Henson2012-04-191-0/+4
* prepare for 1.0.1a releaseOpenSSL_1_0_1aDr. Stephen Henson2012-04-191-1/+1
* Check for potentially exploitable overflows in asn1_d2i_read_bioDr. Stephen Henson2012-04-191-0/+9
* Disable SHA-2 ciphersuites in < TLS 1.2 connections.Bodo Möller2012-04-171-0/+3
* Additional workaround for PR#2771Dr. Stephen Henson2012-04-171-3/+12
* CHANGES: mention vpaes fix and harmonize with 1.0.0.Andy Polyakov2012-03-311-1/+17
* update version to 1.0.1a-devDr. Stephen Henson2012-03-221-0/+4
* prepare for 1.0.1 releaseDr. Stephen Henson2012-03-141-1/+1
* correct CHANGESOpenSSL_1_0_1-beta3Dr. Stephen Henson2012-02-231-1/+1
* Fix bug in CVE-2011-4619: check we have really received a client helloDr. Stephen Henson2012-02-161-0/+7
* Additional compatibility fix for MDC2 signature format.Dr. Stephen Henson2012-02-151-0/+4
* An incompatibility has always existed between the format used for RSADr. Stephen Henson2012-02-151-0/+7
* Modify client hello version when renegotiating to enhance interop withDr. Stephen Henson2012-02-091-0/+7
* Fix for DTLS DoS issue introduced by fix for CVE-2011-4109.Dr. Stephen Henson2012-01-181-0/+16
* fix CHANGES entryDr. Stephen Henson2012-01-171-2/+6
* Update for 0.9.8s and 1.0.0f.Bodo Möller2012-01-051-1/+33
* update CHANGESDr. Stephen Henson2012-01-041-1/+1
* Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de>, Michael Tuexen <t...Dr. Stephen Henson2012-01-041-0/+14
* Clear bytes used for block padding of SSL 3.0 records. (CVE-2011-4576)Dr. Stephen Henson2012-01-041-0/+4
* fix CHANGESDr. Stephen Henson2012-01-041-14/+11
* Only allow one SGC handshake restart for SSL/TLS. (CVE-2011-4619)Dr. Stephen Henson2012-01-041-0/+6
* Check GOST parameters are not NULL (CVE-2012-0027)Dr. Stephen Henson2012-01-041-0/+3
* Prevent malformed RFC3779 data triggering an assertion failure (CVE-2011-4577)Dr. Stephen Henson2012-01-041-0/+5
* update CHANGESDr. Stephen Henson2011-12-311-0/+3
* PR: 2658Dr. Stephen Henson2011-12-311-0/+3