- 22 10月, 2001 1 次提交
-
-
由 Bodo Möller 提交于
-
- 17 10月, 2001 1 次提交
-
-
由 Dr. Stephen Henson 提交于
to digests to retain compatibility.
-
- 16 10月, 2001 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Retain compatibility of EVP_DigestInit() and EVP_DigestFinal() with existing code. Modify library to use digest *_ex() functions.
-
- 24 9月, 2001 1 次提交
-
-
由 Bodo Möller 提交于
-
- 21 9月, 2001 1 次提交
-
-
由 Bodo Möller 提交于
reveal whether illegal block cipher padding was found or a MAC verification error occured. In ssl/s2_pkt.c, verify that the purported number of padding bytes is in the legal range.
-
- 31 7月, 2001 1 次提交
-
-
由 Ben Laurie 提交于
-
- 20 6月, 2001 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Change all calls to low level digest routines in the library and applications to use EVP. Add missing calls to HMAC_cleanup() and don't assume HMAC_CTX can be copied using memcpy(). Note: this is almost identical to the patch submitted to openssl-dev by Verdon Walker <VWalker@novell.com> except some redundant EVP_add_digest_()/EVP_cleanup() calls were removed and some changes made to avoid compiler warnings.
-
- 16 6月, 2001 1 次提交
-
-
由 Bodo Möller 提交于
-
- 07 6月, 2001 1 次提交
-
-
由 Richard Levitte 提交于
Spotted by Nalin Dahyabhai <nalin@redhat.com>
-
- 08 4月, 2001 2 次提交
-
-
由 Bodo Möller 提交于
-
由 Richard Levitte 提交于
Protect against future mistakes with an assert().
-
- 03 4月, 2001 1 次提交
-
-
由 Bodo Möller 提交于
compiler bug reported in <01032110293775.22278@weba3.iname.net> (the '++seq[i]' condition is evaluated as 256 rather than 0 when the previous value is 255).
-
- 07 3月, 2001 1 次提交
-
-
由 Bodo Möller 提交于
-
- 02 6月, 2000 1 次提交
-
-
由 Richard Levitte 提交于
like Malloc, Realloc and especially Free conflict with already existing names on some operating systems or other packages. That is reason enough to change the names of the OpenSSL memory allocation macros to something that has a better chance of being unique, like prepending them with OPENSSL_. This change includes all the name changes needed throughout all C files.
-
- 22 2月, 2000 1 次提交
-
-
由 Dr. Stephen Henson 提交于
the old functionality. Various warning fixes. Initial EVP symmetric cipher docs.
-
- 21 2月, 2000 1 次提交
-
-
由 Bodo Möller 提交于
-
- 04 2月, 2000 1 次提交
-
-
由 Ulf Möller 提交于
-
- 06 1月, 2000 2 次提交
-
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
- 29 12月, 1999 1 次提交
-
-
由 Bodo Möller 提交于
if anyone had actually ever needed that they should have fixed this typo)
-
- 05 6月, 1999 1 次提交
-
-
由 Ulf Möller 提交于
Submitted by: Martin Kraemer <Martin.Kraemer@MchP.Siemens.De>
-
- 27 4月, 1999 1 次提交
-
-
由 Ulf Möller 提交于
-
- 24 4月, 1999 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Reviewed by: PR:
-
- 20 4月, 1999 1 次提交
-
-
由 Ulf Möller 提交于
-
- 18 4月, 1999 1 次提交
-
-
由 Ben Laurie 提交于
-
- 22 2月, 1999 1 次提交
-
-
由 Ben Laurie 提交于
-
- 16 2月, 1999 1 次提交
-
-
由 Mark J. Cox 提交于
[Eric A. Young, (from changes to C2Net SSLeay, integrated by Mark Cox)] Fix so that the version number in the master secret, when passed via RSA, checks that if TLS was proposed, but we roll back to SSLv3 (because the server will not accept higher), that the version number is 0x03,0x01, not 0x03,0x00 [Eric A. Young, (from changes to C2Net SSLeay, integrated by Mark Cox)] Submitted by: Reviewed by: PR:
-
- 13 2月, 1999 1 次提交
-
-
由 Ben Laurie 提交于
wrong keylength with export null ciphers.
-
- 11 1月, 1999 1 次提交
-
-
由 Ben Laurie 提交于
-
- 08 1月, 1999 1 次提交
-
-
由 Ben Laurie 提交于
-
- 21 12月, 1998 3 次提交
-
-
由 Ralf S. Engelschall 提交于
-
由 Ralf S. Engelschall 提交于
-
由 Ralf S. Engelschall 提交于
-