1. 8d91458 - Added X509 CA Path support by Paul Bakker · 12 years ago
  2. e6ee41f - Added OpenSSL / PolarSSL compatibility script (tests/compat.sh) and example application (programs/ssl/o_p_test) (Requires OpenSSL) by Paul Bakker · 13 years ago
  3. f6198c1 - mpi_exp_mod() now correctly handles negative base numbers (Closes ticket #52) by Paul Bakker · 13 years ago
  4. 5b37784 - Updated with tickets by Paul Bakker · 13 years ago
  5. 4d2c124 - Changed certificate verify behaviour to comply with RFC 6125 section 6.3 to not match CN if subjectAltName extension is present. by Paul Bakker · 13 years ago
  6. 186751d - Moved out_msg to out_hdr + 32 to support hardware acceleration by Paul Bakker · 13 years ago
  7. 6b906e5 - Const correctness mpi_get_bit() - Documentation mpi_lsb(), mpi_msb() by Paul Bakker · 13 years ago
  8. 05ef835 - Added support for Hardware Acceleration hooking in SSL/TLS by Paul Bakker · 13 years ago
  9. fad3893 - Added release notes for 1.1.2 and 1.1.3 to trunk by Paul Bakker · 13 years ago
  10. 01cc394 - Added commandline error code convertor (util/strerror) by Paul Bakker · 13 years ago
  11. 430ffbe - Fixed potential heap corruption in x509_name allocation by Paul Bakker · 13 years ago
  12. 4cf2b7f - Added name by Paul Bakker · 13 years ago
  13. 84bef1d - Fixed DHM length to correct one by Paul Bakker · 13 years ago
  14. ca4ab49 - Added GCM ciphersuites to TLS implementation by Paul Bakker · 13 years ago
  15. 915940e - Added TLS1.2 by Paul Bakker · 13 years ago
  16. 452d532 - Fixed potential memory corruption on miscrafted client messages (found by Frama-C team at CEA LIST) by Paul Bakker · 13 years ago
  17. 7beceb2 by Paul Bakker · 13 years ago
  18. 3782458 - Added Changelog for bugfix in mpi_cmp_mpi() by Paul Bakker · 13 years ago
  19. 89e80c9 - Added base Galois/Counter mode (GCM) for AES by Paul Bakker · 13 years ago
  20. bdb912d - Added preliminary ASN.1 buffer writing support by Paul Bakker · 13 years ago
  21. 048d04e - AES code only check for Padlock once by Paul Bakker · 13 years ago
  22. 1504af5 - Removed redundant POLARSSL_DEBUG_MSG define by Paul Bakker · 13 years ago
  23. a8cd239 - Added support for wildcard certificates by Paul Bakker · 13 years ago
  24. fab5c82 - Added support for NULL cipher (POLARSSL_CIPHER_NULL_CIPHER) and weak ciphersuites (POLARSSL_ENABLE_WEAK_CIPHERSUITES). They are disabled by default! by Paul Bakker · 13 years ago
  25. 99955bf - Final changes for 1.1.1 release by Paul Bakker · 13 years ago
  26. 2ec0a56 - Fixed issue with Intel compiler on 64-bit platforms by Paul Bakker · 13 years ago
  27. b15b851 - Check for failed malloc() in ssl_set_hostname() and x509_get_entries() (Closes ticket #47, found by Hugo Leisink) by Paul Bakker · 13 years ago
  28. 08a5088 - Updated release date by Paul Bakker · 13 years ago
  29. a42b3e9 - Fixed top line for version by Paul Bakker · 13 years ago
  30. 69e095c - Changed the behaviour of x509parse_parse_crt for permissive parsing. Now returns the number of 'failed certificates' instead of having a switch to enable it. by Paul Bakker · 13 years ago
  31. c50132d - Updated version of PolarSSL to 1.1.0 by Paul Bakker · 13 years ago
  32. c8ffbe7 - Corrected removal of leading '00:' in printing serial numbers in certificates and CRLs by Paul Bakker · 13 years ago
  33. 4f5ae80 - Fixed MS Visual C++ name clash with int64 in sha4.h by Paul Bakker · 13 years ago
  34. 508ad5a - Moved all examples programs to use the new entropy and CTR_DRBG by Paul Bakker · 13 years ago
  35. 6c0ceb3 - Added permissive certificate parsing to x509parse_crt() and x509parse_crtfile(). With permissive parsing the parsing does not stop on encountering a parse-error by Paul Bakker · 13 years ago
  36. 6083fd2 - Added a generic entropy accumulator that provides support for adding custom entropy sources and added some generic and platform dependent entropy sources by Paul Bakker · 13 years ago
  37. a3d195c - Changed the used random function pointer to more flexible format. Renamed havege_rand() to havege_random() to prevent mistakes. Lots of changes as a consequence in library code and programs by Paul Bakker · 13 years ago
  38. 0e04d0e - Added CTR_DRBG based on AES-256-CTR (NIST SP 800-90) random generator by Paul Bakker · 13 years ago
  39. 4463740 - Improved build support for s390x and sparc64 in bignum.h by Paul Bakker · 13 years ago
  40. 03c7c25 - * If certificate serial is longer than 32 octets, serial number is now appended with '....' after first 28 octets by Paul Bakker · 13 years ago
  41. fe3256e - Introduced POLARSSL_MPI_MAX_SIZE and POLARSSL_MPI_MAX_BITS for MPI size management (Closes ticket #44) by Paul Bakker · 13 years ago
  42. b6d5f08 - Added POLARSSL_MPI_WINDOW_SIZE definition to allow easier time to memory trade-off by Paul Bakker · 13 years ago
  43. 2e6d532 - Added credits! by Paul Bakker · 13 years ago
  44. cce9d77 - Lots of minimal changes to better support WINCE as a build target by Paul Bakker · 13 years ago
  45. 5e18aed - Changed the defined key-length of DES ciphers in cipher.h to include the parity bits, to prevent mistakes in copying data. (Closes ticket #33) by Paul Bakker · 13 years ago
  46. 1fe7d9b - Fixed incorrect behaviour in case of RSASSA-PSS with a salt length smaller than the hash length. (Closes ticket #41) by Paul Bakker · 13 years ago
  47. cebdf17 - Allowed X509 key usage parsing to accept 4 byte values instead of the standard 1 byte version sometimes used by Microsoft. (Closes ticket #38) by Paul Bakker · 13 years ago
  48. 03a30d3 - Added latest fix to ChangeLog by Paul Bakker · 13 years ago
  49. efc3029 - Extracted ASN.1 parsing code from the X.509 parsing code. Added new module. by Paul Bakker · 13 years ago
  50. b5a11ab - Added a separate CRL entry extension parsing function by Paul Bakker · 13 years ago
  51. fbc09f3 - Added an EXPLICIT tag number parameter to x509_get_ext() by Paul Bakker · 13 years ago
  52. 3329d1f - Fixed a bug where the CRL parser expected an EXPLICIT ASN.1 tag before version numbers by Paul Bakker · 13 years ago
  53. c4909d9 - Inceased maximum size of ASN1 length reads to 32-bits by Paul Bakker · 13 years ago
  54. fa1c592 - Fixed faulty HMAC-MD2 implementation (Fixes ticket #37) by Paul Bakker · 13 years ago
  55. d246ed3 - Fixed rsa_encrypt and rsa_decrypt example programs to use public key for encryption and private key for decryption (Fixes ticket #34) by Paul Bakker · 13 years ago
  56. ca6f3e2 - Clarified use of AES and Camellia in CFB and CTR modes by Paul Bakker · 13 years ago
  57. 490ecc8 - Added ssl_set_max_version() to set the client's maximum sent version number by Paul Bakker · 13 years ago
  58. 7eb013f - Added ssl_session_reset() to allow re-use of already set non-connection specific context information by Paul Bakker · 13 years ago
  59. 7bc05ff - Added rsa_encrypt and rsa_decrypt example programs by Paul Bakker · 13 years ago
  60. 968bc98 - Preparations for v1.0.0 release of PolarSSL by Paul Bakker · 13 years ago
  61. 42e5981 - Updated to reflect changes in error codes in the generic cipher and message digest layers by Paul Bakker · 13 years ago
  62. 343a870 - Expanded generic cipher layer with support for CTR and CFB128 modes of operation. by Paul Bakker · 13 years ago
  63. 887bd50 - Undid fix for ssl_write that introduced a true bug when buffers are running full. by Paul Bakker · 13 years ago
  64. 828acb2 - Updated for release 0.99-pre5 by Paul Bakker · 14 years ago
  65. 1496d38 - Added the ssl_mail_client example application by Paul Bakker · 14 years ago
  66. 2f5947e - Added mpi_get_bit() and mpi_set_bit() individual bit setter/getter functions. by Paul Bakker · 14 years ago
  67. 831a755 - Changed behaviour of net_recv(), ssl_fetch_input() and ssl_read(). net_recv() now returns 0 on EOF instead of POLARSSL_ERR_NET_CONN_RESET. ssl_fetch_input() returns POLARSSL_ERR_SSL_CONN_EOF on an EOF from its f_recv() function. ssl_read() returns 0 if a POLARSSL_ERR_SSL_CONN_EOF is received after the handshake. by Paul Bakker · 14 years ago
  68. 9d78140 - A error_strerror function() has been added to translate between error codes and their description. by Paul Bakker · 14 years ago
  69. 6c591fa - mpi_init() and mpi_free() only accept a single argument and do not accept variable arguments anymore. This prevents unexpected memory corruption in a number of use cases. by Paul Bakker · 14 years ago
  70. 335db3f - Functions requiring File System functions can now be disables by undefining POLARSSL_FS_IO by Paul Bakker · 14 years ago
  71. a755ca1 - Renamed t_s_int, t_int and t_dbl to respectively t_sint, t_uint and t_udbl for clarity by Paul Bakker · 14 years ago
  72. 23986e5 - Major type rewrite of int to size_t for most variables and arguments used for buffer lengths and loops by Paul Bakker · 14 years ago
  73. b6ecaf5 - Added additional (configurable) cipher block modes. AES-CTR, Camellia-CTR, XTEA-CBC by Paul Bakker · 14 years ago
  74. 3efa575 - Ready for release 0.99-pre4 by Paul Bakker · 14 years ago
  75. 287781a - Added mpi_fill_random() for centralized filling of big numbers with random data (Fixed ticket #10) by Paul Bakker · 14 years ago
  76. 9867549 - Added information about changed behaviour of x509parse_key() by Paul Bakker · 14 years ago
  77. e77db2e - Added bugfix info for previous checkin by Paul Bakker · 14 years ago
  78. 1fd00bf - Fixed bug in ssl_write() when flushing old data (Fixes ticket #18) by Paul Bakker · 14 years ago
  79. be4e7dc - Debug print of MPI now removes leading zero octets and displays actual bit size of the value by Paul Bakker · 14 years ago
  80. 9dcc322 - Added support for PKCS#1 v2.1 encoding and thus support for the RSAES-OAEP and RSASSA-PSS operations (enabled by POLARSSL_PKCS1_V21) by Paul Bakker · 14 years ago
  81. 345a6fe - Replaced function that fixes man-in-the-middle attack by Paul Bakker · 14 years ago
  82. 1946e42 - Made ready for 0.99-pre2 release by Paul Bakker · 14 years ago
  83. e2a39cc - Do not bail out if no client certificate specified. Try to negotiate anonymous connection (Fixes ticket #12) by Paul Bakker · 14 years ago
  84. 400ff6f - Corrected parsing of UTCTime dates before 1990 and after 1950 by Paul Bakker · 14 years ago
  85. a9507c0 - Added crl_app program to allow easy reading and printing of X509 CRLs from file by Paul Bakker · 14 years ago
  86. 96743fc - Parsing of PEM files moved to separate module (Fixes ticket #13). Also possible to remove PEM support for systems only using DER encoding by Paul Bakker · 14 years ago
  87. 9fc4659 - Preparing for Release of 0.99 prerelease 1 by Paul Bakker · 14 years ago
  88. e3166ce - Renamed ciphers member of ssl_context and cipher member of ssl_session to ciphersuites and ciphersuite respectively. This clarifies the difference with the generic cipher layer and is better naming altogether by Paul Bakker · 14 years ago
  89. 20a7808 - Addec crypt_and_hash example program of the generic hash and cipher layers by Paul Bakker · 14 years ago
  90. 43b7e35 - Support for PKCS#11 through the use of the pkcs11-helper library by Paul Bakker · 14 years ago
  91. b619499 - x509parse_time_expired() checks time now in addition to the existing date check by Paul Bakker · 14 years ago
  92. 72f6266 - Improved information provided about current Hashing, Cipher and Suite capabilities by Paul Bakker · 14 years ago
  93. 76fd75a - Improved certificate validation and validation against the available CRLs by Paul Bakker · 14 years ago
  94. 43ca69c - Added function for stringified SSL/TLS version by Paul Bakker · 14 years ago
  95. 1f87fb6 - Support for DES weak keys and parity bits added by Paul Bakker · 14 years ago
  96. 74111d3 - Improved X509 certificate parsing to include extended certificate fields, such as Key Usage by Paul Bakker · 14 years ago
  97. b63b0af - Added verification callback in certificate verification chain in order to allow external blacklisting by Paul Bakker · 14 years ago
  98. 1b57b06 - Added reading of DHM context from memory and file by Paul Bakker · 14 years ago
  99. 8123e9d - Added generic cipher wrapper for integration with OpenVPN (donated by Fox-IT) by Paul Bakker · 14 years ago
  100. 1737385 - Added generic message digest wrapper for integration with OpenVPN (donated by Fox-IT) by Paul Bakker · 14 years ago