- 26 12月, 2000 1 次提交
-
-
由 Bodo Möller 提交于
-
- 15 12月, 2000 2 次提交
-
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
- 01 12月, 2000 1 次提交
-
-
由 Richard Levitte 提交于
First tentative impementation of Kerberos 5 cryptos and keys for SSL/TLS. Implemented by Vern Staats <staatsvr@asc.hpc.mil>, further hacked and distributed by Jeffrey Altman <jaltnab@columbia.edu>
-
- 28 11月, 2000 2 次提交
-
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
- 17 11月, 2000 1 次提交
-
-
由 Bodo Möller 提交于
-
- 21 6月, 2000 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Fixes for Win32 build. This is mostly a work around for the old VC++ problem that it treats func() as func(void). Various prototypes had been added to 'compare' function pointers that triggered this. This could be fixed by removing the prototype, adding function pointer casts to every call or changing the passed function to use the expected arguments. I mostly did the latter. The mkdef.pl script was modified to remove the typesafe functions which no longer exist. Oh and some functions called OPENSSL_freeLibrary() were changed back to FreeLibrary(), wonder how that happened :-)
-
- 02 6月, 2000 1 次提交
-
-
由 Richard Levitte 提交于
like Malloc, Realloc and especially Free conflict with already existing names on some operating systems or other packages. That is reason enough to change the names of the OpenSSL memory allocation macros to something that has a better chance of being unique, like prepending them with OPENSSL_. This change includes all the name changes needed throughout all C files.
-
- 14 3月, 2000 2 次提交
-
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
in SSL_new. If SSL_OP_SINGLE_DH_USE is set, don't waste time in SSL_[CTX_]set_tmp_dh on computing a DH key that will be ignored anyway. ssltest -dhe1024dsa (w/ 160-bit sub-prime) had an unfair performance advantage over -dhe1024 (safe prime): SSL_OP_SINGLE_DH_USE was effectively always enabled because SSL_new ignored the DH key set in the SSL_CTX. Now -dhe1024 takes the server only about twice as long as -dhe1024dsa instead of three times as long (for 1024 bit RSA with 1024 bit DH).
-
- 22 2月, 2000 1 次提交
-
-
由 Bodo Möller 提交于
-
- 21 2月, 2000 2 次提交
-
-
由 Richard Levitte 提交于
designed for that. This removes the potential error to mix data and function pointers. Please note that I'm a little unsure how incorrect calls to the old ctrl functions should be handled, in som cases. I currently return 0 and that's it, but it may be more correct to generate a genuine error in those cases.
-
由 Bodo Möller 提交于
-
- 22 1月, 2000 1 次提交
-
-
由 Dr. Stephen Henson 提交于
minor changes. Docs haven't been added at this stage. They are probably best included in the 'ciphers' program docs.
-
- 18 1月, 2000 1 次提交
-
-
由 Richard Levitte 提交于
non-function pointers to function pointers and vice versa. The current solution is to have unions that describe the conversion we want to do, and gives us the ability to extract the type of data we want. The current solution is a quick fix, and can probably be made in a more general or elegant way.
-
- 30 9月, 1999 1 次提交
-
-
由 Ulf Möller 提交于
-
- 15 5月, 1999 1 次提交
-
-
由 Bodo Möller 提交于
-
- 13 5月, 1999 1 次提交
-
-
由 Ulf Möller 提交于
Submitted by: Richard Levitte <richard@levitte.org>
-
- 10 5月, 1999 1 次提交
-
-
由 Bodo Möller 提交于
pointers. The cert_st handling is changed by this in various ways. Submitted by: Reviewed by: PR:
-
- 27 4月, 1999 2 次提交
-
-
由 Ulf Möller 提交于
-
由 Ulf Möller 提交于
-
- 24 4月, 1999 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Reviewed by: PR:
-
- 23 4月, 1999 1 次提交
-
-
由 Ben Laurie 提交于
-
- 22 4月, 1999 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Reviewed by: PR:
-
- 20 4月, 1999 1 次提交
-
-
由 Ulf Möller 提交于
-
- 18 4月, 1999 1 次提交
-
-
由 Ben Laurie 提交于
-
- 16 4月, 1999 1 次提交
-
-
由 Ben Laurie 提交于
-
- 13 4月, 1999 1 次提交
-
-
由 Ben Laurie 提交于
-
- 22 3月, 1999 1 次提交
-
-
由 Ben Laurie 提交于
-
- 06 3月, 1999 2 次提交
-
-
由 Ben Laurie 提交于
-
由 Ben Laurie 提交于
-
- 25 2月, 1999 2 次提交
-
-
由 Ralf S. Engelschall 提交于
private keys and/or callback functions which directly correspond to their SSL_CTX_xxx() counterparts but work on a per-connection basis. This is needed for applications which have to configure certificates on a per-connection basis (e.g. Apache+mod_ssl) instead of a per-context basis (e.g. s_server). For the RSA certificate situation is makes no difference, but for the DSA certificate situation this fixes the "no shared cipher" problem where the OpenSSL cipher selection procedure failed because the temporary keys were not overtaken from the context and the API provided no way to reconfigure them. The new functions now let applications reconfigure the stuff and they are in detail: SSL_need_tmp_RSA, SSL_set_tmp_rsa, SSL_set_tmp_dh, SSL_set_tmp_rsa_callback and SSL_set_tmp_dh_callback. Additionally a new non-public-API function ssl_cert_instantiate() is used as a helper function and also to reduce code redundancy inside ssl_rsa.c. Submitted by: Ralf S. Engelschall Reviewed by: Ben Laurie
-
由 Ralf S. Engelschall 提交于
within SSL_MKEY_MASK or SSL_AUTH_MASK, they are within SSL_EXP_MASK. So, the original variable has to be used instead of the already masked variable. Submitted by: Richard Levitte <levitte@stacken.kth.se> Reviewed by: Ralf S. Engelschall
-
- 22 2月, 1999 4 次提交
-
-
由 Dr. Stephen Henson 提交于
without -debug option to mk1mf.pl. Change _export to is_export (_export is a reserved word under VC++). Add yucky function prototype function pointer casts. Sanitise the included files in crypto/x509v3. Also changed ssleay.exe target to openssl.exe
-
由 Ben Laurie 提交于
-
由 Ben Laurie 提交于
-
由 Ben Laurie 提交于
-
- 16 2月, 1999 1 次提交
-
-
由 Mark J. Cox 提交于
[Eric A. Young, (from changes to C2Net SSLeay, integrated by Mark Cox)] Fix so that the version number in the master secret, when passed via RSA, checks that if TLS was proposed, but we roll back to SSLv3 (because the server will not accept higher), that the version number is 0x03,0x01, not 0x03,0x00 [Eric A. Young, (from changes to C2Net SSLeay, integrated by Mark Cox)] Submitted by: Reviewed by: PR:
-
- 17 1月, 1999 1 次提交
-
-
由 Ben Laurie 提交于
-