Age | Commit message (Collapse) | Author |
|
|
|
|
|
|
|
Broken-by: 854586e149
|
|
|
|
Broken-by: 854586e149
|
|
Broken-by: 854586e149
|
|
OpenSSL 1.0.1t is known bad. 1.0.2 and 1.1.0 are apparently ok.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Broken-by: 838d897c8e
|
|
This would be wanted for server OCSP stapling in a dual RSA/ECDSA certificate installation
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
configured
|
|
|
|
|
|
The new store_newblock() includes the required safety checck, plus the alocate
and data-copy operations.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
OpenBSD seems to prioritize the child of a fork; Linux & FreeBSD the parent
|
|
More recent OpenSSL versions (1.1.0) reasonably prefer ECDSA when available,
where older (1.0.2) preferred RSA
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|