- 13 4月, 2002 1 次提交
-
-
由 Ulf Möller 提交于
prime!
-
- 07 4月, 2002 1 次提交
-
-
由 Ulf Möller 提交于
-
- 05 3月, 2002 1 次提交
-
-
由 Bodo Möller 提交于
[Chosen plaintext attack: R. Merkle, M. Hellman: "On the Security of Multiple Encryption", CACM 24 (1981) pp. 465-467, p. 776. Known plaintext angriff: P.C. van Oorschot, M. Wiener: "A known-plaintext attack on two-key triple encryption", EUROCRYPT '90.]
-
- 28 2月, 2002 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: D. K. Smetters <smetters@parc.xerox.com> Reviewed by: Bodo Moeller
-
- 27 2月, 2002 1 次提交
-
-
由 Lutz Jänicke 提交于
-
- 15 2月, 2002 1 次提交
-
-
由 Lutz Jänicke 提交于
-
- 25 1月, 2002 1 次提交
-
-
由 Bodo Möller 提交于
ERR_peek_last_error ERR_peek_last_error_line ERR_peek_last_error_line_data (supersedes ERR_peek_top_error). Rename OPENSSL_NO_OLD_DES_SUPPORT into OPENSSL_DISABLE_OLD_DES_SUPPORT because OPENSSL_NO_... indicates disabled algorithms (according to mkdef.pl).
-
- 22 1月, 2002 1 次提交
-
-
由 Lutz Jänicke 提交于
-
- 04 1月, 2002 5 次提交
-
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
'openssl version -d' use some descriptions from Lutz' redundant manual page instead of the previous ones
-
由 Lutz Jänicke 提交于
-
由 Lutz Jänicke 提交于
-
由 Dr. Stephen Henson 提交于
-
- 10 12月, 2001 1 次提交
-
-
由 Ben Laurie 提交于
-
- 04 12月, 2001 1 次提交
-
-
由 Richard Levitte 提交于
main documentation, so let's warn them a little more, so the word "OBSOLETE" really gets understood.
-
- 03 12月, 2001 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 02 12月, 2001 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 26 11月, 2001 1 次提交
-
-
由 Bodo Möller 提交于
-
- 19 11月, 2001 1 次提交
-
-
由 Lutz Jänicke 提交于
(shinagawa@star.zko.dec.com).
-
- 10 11月, 2001 2 次提交
-
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
- 08 11月, 2001 1 次提交
-
-
由 Bodo Möller 提交于
-
- 26 10月, 2001 4 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Ulf Möller 提交于
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
some password reading functions are really part of the UI compatibility library...
-
- 25 10月, 2001 4 次提交
-
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
the e-mail address in the DN (i.e., it will go into a certificate extension only). The new configuration file option 'email_in_dn = no' has the same effect. Submitted by: Massimiliano Pala madwolf@openca.org
-
由 Richard Levitte 提交于
the docs to reflect this change and correct libeay.num.
-
由 Richard Levitte 提交于
libdes (which is still used out there) or other des implementations, the OpenSSL DES functions are renamed to begin with DES_ instead of des_. Compatibility routines are provided and declared by including openssl/des_old.h. Those declarations are the same as were in des.h when the OpenSSL project started, which is exactly how libdes looked at that time, and hopefully still looks today. The compatibility functions will be removed in some future release, at the latest in version 1.0.
-
- 21 10月, 2001 1 次提交
-
-
由 Bodo Möller 提交于
New macros SSL[_CTX]_set_msg_callback_arg(). Message callback imlementation for SSL 3.0/TLS 1.0 (no SSL 2.0 yet). New '-msg' option for 'openssl s_client' and 'openssl s_server' that enable a message callback that displays all protocol messages. In ssl3_get_client_hello (ssl/s3_srvr.c), generate a fatal alert if client_version is smaller than the protocol version in use. Also change ssl23_get_client_hello (ssl/s23_srvr.c) to select TLS 1.0 if the client demanded SSL 3.0 but only TLS 1.0 is enabled; then the client will at least see that alert. Fix SSL[_CTX]_ctrl prototype (void * instead of char * for generic pointer). Add/update some OpenSSL copyright notices.
-
- 17 10月, 2001 2 次提交
-
-
由 Bodo Möller 提交于
-
由 Dr. Stephen Henson 提交于
-
- 16 10月, 2001 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 12 10月, 2001 1 次提交
-
-
由 Lutz Jänicke 提交于
From: "Chris D. Peterson" <cpeterson@aventail.com> Subject: Implementation Issues with OpenSSL To: openssl-users@openssl.org Date: Wed, 22 Aug 2001 16:13:17 -0700 The patch included in the original post may improve the internal session list handling (and is therefore worth a seperate investigation). No change to the list handling will however solve the problems of incorrect SSL_SESSION_free() calls. The session list is only one possible point of failure, dangling pointers would also occur for SSL object currently using the session. The correct solution is to only use SSL_SESSION_free() when applicable!
-
- 08 10月, 2001 1 次提交
-
-
由 Lutz Jänicke 提交于
-
- 13 9月, 2001 3 次提交
-
-
由 Lutz Jänicke 提交于
-
由 Lutz Jänicke 提交于
-
由 Lutz Jänicke 提交于
Bodo Moeller).
-
- 11 9月, 2001 1 次提交
-
-
由 Lutz Jänicke 提交于
settable (proposed by "Douglas E. Engert" <deengert@anl.gov>).
-