- 07 1月, 2010 2 次提交
-
-
由 Dr. Stephen Henson 提交于
1. Add provisional SCSV value. 2. Don't send SCSV and RI at same time. 3. Fatal error is SCSV received when renegotiating.
-
由 Dr. Stephen Henson 提交于
-
- 06 1月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 01 1月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
algorithm matches current and give error if compression is disabled and server requests it (shouldn't happen unless server is broken).
-
- 31 12月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
used compression algorithms in client hello (a legacy from when the compression algorithm wasn't serialized with SSL_SESSION).
-
- 28 12月, 2009 3 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
MCSV is now called SCSV. Don't send SCSV if renegotiating. Also note if RI is empty in debug messages.
-
- 17 12月, 2009 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 14 12月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
RI. Reorganise RI checking code and handle some missing cases.
-
- 11 12月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 09 12月, 2009 4 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
Change RI ctrl so it doesn't clash.
-
由 Dr. Stephen Henson 提交于
-
- 08 12月, 2009 3 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
work in SSLv3: initial handshake has no extensions but includes MCSV, if server indicates RI support then renegotiation handshakes include RI. NB: current MCSV value is bogus for testing only, will be updated when we have an official value. Change mismatch alerts to handshake_failure as required by spec. Also have some debugging fprintfs so we can clearly see what is going on if OPENSSL_RI_DEBUG is set.
-
由 Dr. Stephen Henson 提交于
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Add extension support to DTLS code mainly using existing implementation for TLS.
-
- 07 12月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 02 12月, 2009 3 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Approved by: steve@openssl.org Add Renegotiation extension to DTLS, fix DTLS ClientHello processing bug.
-
- 18 11月, 2009 3 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 13 11月, 2009 1 次提交
-
-
由 Richard Levitte 提交于
-
- 11 11月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 10 11月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 08 11月, 2009 2 次提交
-
-
由 Dr. Stephen Henson 提交于
ticket to request a new session.
-
由 Dr. Stephen Henson 提交于
-
- 02 11月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Approved by: steve@openssl.org DTLS Fragment size bug fix.
-
- 30 10月, 2009 2 次提交
-
-
由 Dr. Stephen Henson 提交于
of when a session is loaded. This will mean that applications that just hold onto SSL_SESSION structures and never call d2i_SSL_SESSION() will still work.
-
由 Dr. Stephen Henson 提交于
-
- 29 10月, 2009 3 次提交
-
-
由 Dr. Stephen Henson 提交于
ID length is zero.
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
Submitted by: Mike Frysinger <vapier@gentoo.org> Approved by: steve@openssl.org Change domd test to match 1.0.0+ version: check $MAKEDEPEND ends in "gcc" to support cross compilers.
-
- 16 10月, 2009 2 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Tomas Mraz <tmraz@redhat.com> Approved by: steve@openssl.org Avoid potential doublefree and reuse of freed handshake_buffer.
-
由 Dr. Stephen Henson 提交于
Submitted by: Tomas Mraz <tmraz@redhat.com> Approved by: steve@openssl.org Don't access freed SSL_CTX in SSL_free().
-
- 05 10月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-