- 29 8月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
all derived keys to the message callback. Add code to SSL_trace to include support for printing out keys.
-
- 05 1月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 01 6月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 20 5月, 2011 2 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Alexei Khlebnikov <alexei.khlebnikov@opera.com> Reviewed by: steve OOM checking. Leak in OOM fix. Fall-through comment. Duplicate code elimination.
-
由 Dr. Stephen Henson 提交于
-
- 30 4月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
checking added, SHA256 PRF support added. At present only RSA key exchange ciphersuites work with TLS v1.2 as the new signature format is not yet implemented.
-
- 12 6月, 2010 1 次提交
-
-
由 Ben Laurie 提交于
-
- 20 4月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 06 4月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 30 12月, 2008 1 次提交
-
-
由 Ben Laurie 提交于
test for them!
-
- 29 12月, 2008 2 次提交
-
-
由 Ben Laurie 提交于
-
由 Ben Laurie 提交于
-
- 27 12月, 2008 1 次提交
-
-
由 Ben Laurie 提交于
-
- 07 9月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
and cast from pointer to int of different size (linux-x86_64 and align).
-
- 31 8月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Victor B. Wagner <vitus@cryptocom.ru>
-
- 05 6月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 17 2月, 2007 2 次提交
-
-
由 Bodo Möller 提交于
This change resolves a number of problems and obviates multiple kludges. A new feature is that you can now say "AES256" or "AES128" (not just "AES", which enables both). In some cases the ciphersuite list generated from a given string is affected by this change. I hope this is just in those cases where the previous behaviour did not make sense.
-
由 Nils Larsch 提交于
PR: 1490
-
- 11 3月, 2006 1 次提交
-
-
由 Nils Larsch 提交于
PR: 1191 Submitted by: Mika Kousa and Pasi Eronen of Nokia Corporation Reviewed by: Nils Larsch
-
- 08 1月, 2006 2 次提交
-
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
Submitted by: Peter Sylvester
-
- 01 10月, 2005 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 27 4月, 2005 1 次提交
-
-
由 Ben Laurie 提交于
-
- 04 11月, 2003 1 次提交
-
-
由 Geoff Thorpe 提交于
Submitted by: Nils Larsch
-
- 30 10月, 2003 1 次提交
-
-
由 Geoff Thorpe 提交于
I have tried to convert 'len' type variable declarations to unsigned as a means to address these warnings when appropriate, but when in doubt I have used casts in the comparisons instead. The better solution (that would get us all lynched by API users) would be to go through and convert all the function prototypes and structure definitions to use unsigned variables except when signed is necessary. The proliferation of (signed) "int" for strictly non-negative uses is unfortunate.
-
- 12 2月, 2003 1 次提交
-
-
由 Bodo Möller 提交于
-
- 28 11月, 2002 1 次提交
-
-
由 Richard Levitte 提交于
I've covered all the memset()s I felt safe modifying, but may have missed some.
-
- 13 11月, 2002 1 次提交
-
-
由 Ben Laurie 提交于
-
- 10 7月, 2002 1 次提交
-
-
由 Lutz Jänicke 提交于
des_old.h redefines crypt: #define crypt(b,s)\ DES_crypt((b),(s)) This scheme leads to failure, if header files with the OS's true definition of crypt() are processed _after_ des_old.h was processed. This is e.g. the case on HP-UX with unistd.h. As evp.h now again includes des.h (which includes des_old.h), this problem only came up after this modification. Solution: move header files (indirectly) including e_os.h before the header files (indirectly) including evp.h. Submitted by: Reviewed by: PR:
-
- 09 7月, 2002 1 次提交
-
-
由 Bodo Möller 提交于
(but noone uses it anyway) fix t1_enc.c: use OPENSSL_NO_RC4, not NO_RC4
-
- 14 6月, 2002 1 次提交
-
-
由 Bodo Möller 提交于
vulnerability workaround (included in SSL_OP_ALL). PR: #90
-
- 14 4月, 2002 1 次提交
-
-
由 Bodo Möller 提交于
Fix length checks in ssl3_get_client_hello(). Use s->s3->in_read_app_data differently to fix ssl3_read_internal().
-
- 22 10月, 2001 1 次提交
-
-
由 Bodo Möller 提交于
-
- 17 10月, 2001 1 次提交
-
-
由 Dr. Stephen Henson 提交于
to digests to retain compatibility.
-
- 16 10月, 2001 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Retain compatibility of EVP_DigestInit() and EVP_DigestFinal() with existing code. Modify library to use digest *_ex() functions.
-
- 24 9月, 2001 1 次提交
-
-
由 Bodo Möller 提交于
-
- 21 9月, 2001 1 次提交
-
-
由 Bodo Möller 提交于
reveal whether illegal block cipher padding was found or a MAC verification error occured. In ssl/s2_pkt.c, verify that the purported number of padding bytes is in the legal range.
-
- 31 7月, 2001 1 次提交
-
-
由 Ben Laurie 提交于
-
- 20 6月, 2001 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Change all calls to low level digest routines in the library and applications to use EVP. Add missing calls to HMAC_cleanup() and don't assume HMAC_CTX can be copied using memcpy(). Note: this is almost identical to the patch submitted to openssl-dev by Verdon Walker <VWalker@novell.com> except some redundant EVP_add_digest_()/EVP_cleanup() calls were removed and some changes made to avoid compiler warnings.
-