- 29 11月, 2003 1 次提交
-
-
由 Richard Levitte 提交于
compared it to the amount of bits required... PR: 770 Submitted by: c zhang <czhang2005@hotmail.com>
-
- 28 11月, 2003 1 次提交
-
-
由 Richard Levitte 提交于
PR: 780 Submitted by: Verdon Walker <VWalker@novell.com> Reviewed by: Richard Levitte
-
- 04 11月, 2003 1 次提交
-
-
由 Geoff Thorpe 提交于
Submitted by: Nils Larsch
-
- 30 10月, 2003 1 次提交
-
-
由 Geoff Thorpe 提交于
I have tried to convert 'len' type variable declarations to unsigned as a means to address these warnings when appropriate, but when in doubt I have used casts in the comparisons instead. The better solution (that would get us all lynched by API users) would be to go through and convert all the function prototypes and structure definitions to use unsigned variables except when signed is necessary. The proliferation of (signed) "int" for strictly non-negative uses is unfortunate.
-
- 11 10月, 2003 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 06 10月, 2003 2 次提交
-
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
compression identity is already present among the registered compression methods, and if so, reject the addition request. Declare SSL_COMP_get_compression_method() so it can be used properly. Change ssltest.c so it checks what compression methods are available and enumerates them. As a side-effect, built-in compression methods will be automagically loaded that way. Additionally, change the identities for ZLIB and RLE to be conformant to draft-ietf-tls-compression-05.txt. Finally, make update. Next on my list: have the built-in compression methods added "automatically" instead of requiring that the author call SSL_COMP_add_compression_method() or SSL_COMP_get_compression_methods().
-
- 02 10月, 2003 2 次提交
-
-
由 Richard Levitte 提交于
Notified by Andrew Marlow <AMARLOW1@bloomberg.net>
-
由 Richard Levitte 提交于
-
- 28 9月, 2003 3 次提交
-
-
由 Richard Levitte 提交于
PR: 679
-
由 Richard Levitte 提交于
PR: 680
-
由 Richard Levitte 提交于
In s_server, print the received Kerberos information. PR: 693
-
- 27 9月, 2003 1 次提交
-
-
由 Richard Levitte 提交于
Contributed by Andrew Mann <amann@tccgi.com>
-
- 08 9月, 2003 1 次提交
-
-
由 Geoff Thorpe 提交于
-
- 04 9月, 2003 1 次提交
-
-
由 Dr. Stephen Henson 提交于
one, as required by SSL/TLS specs.
-
- 14 8月, 2003 1 次提交
-
-
由 Bodo Möller 提交于
invalid cases) PR: 674
-
- 12 8月, 2003 1 次提交
-
-
由 Bodo Möller 提交于
-
- 22 7月, 2003 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Douglas Stebila Reviewed by: Bodo Moeller
-
- 21 7月, 2003 1 次提交
-
-
由 Bodo Möller 提交于
PR: 659
-
- 08 4月, 2003 1 次提交
-
-
由 Lutz Jänicke 提交于
the cipher name in the list is not guaranteed to be at least "buflen" long. PR: 567 Submitted by: "Matt Harren" <matth@cs.berkeley.edu>
-
- 04 4月, 2003 1 次提交
-
-
由 Richard Levitte 提交于
-
- 26 3月, 2003 1 次提交
-
-
由 Richard Levitte 提交于
-
- 21 3月, 2003 1 次提交
-
-
由 Bodo Möller 提交于
old OpenSSL releases, but not in new releases)
-
- 20 3月, 2003 1 次提交
-
-
由 Bodo Möller 提交于
-
- 28 2月, 2003 2 次提交
-
-
由 Bodo Möller 提交于
- bugfix: in ECDH_compute_key, pad x coordinate with leading zeros if necessary
-
由 Bodo Möller 提交于
-
- 23 2月, 2003 1 次提交
-
-
由 Ulf Möller 提交于
-
- 19 2月, 2003 1 次提交
-
-
由 Richard Levitte 提交于
An advisory will be posted to the web. Expect a release within the hour.
-
- 16 2月, 2003 1 次提交
-
-
由 Geoff Thorpe 提交于
elements directly, so this missing functionality is required. PR: 276
-
- 14 2月, 2003 1 次提交
-
-
由 Richard Levitte 提交于
PR: 358
-
- 13 2月, 2003 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 12 2月, 2003 1 次提交
-
-
由 Bodo Möller 提交于
-
- 06 2月, 2003 1 次提交
-
-
由 Bodo Möller 提交于
-
- 31 1月, 2003 2 次提交
-
-
由 Richard Levitte 提交于
PR: 364
-
由 Richard Levitte 提交于
PR: 287
-
- 30 1月, 2003 1 次提交
-
-
由 Richard Levitte 提交于
PR: 477
-
- 16 1月, 2003 1 次提交
-
-
由 Richard Levitte 提交于
Notified by Verdon Walker <VWalker@novell.com>
-
- 15 1月, 2003 1 次提交
-
-
由 Lutz Jänicke 提交于
PR: 377
-
- 30 12月, 2002 1 次提交
-
-
由 Lutz Jänicke 提交于
PR: 377
-
- 29 12月, 2002 1 次提交
-
-
由 Richard Levitte 提交于
-