1. 27 1月, 2016 1 次提交
    • R
      Remove /* foo.c */ comments · 34980760
      Rich Salz 提交于
      This was done by the following
              find . -name '*.[ch]' | /tmp/pl
      where /tmp/pl is the following three-line script:
              print unless $. == 1 && m@/\* .*\.[ch] \*/@;
              close ARGV if eof; # Close file to reset $.
      
      And then some hand-editing of other files.
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      34980760
  2. 17 12月, 2015 1 次提交
    • R
      Rename some BUF_xxx to OPENSSL_xxx · 7644a9ae
      Rich Salz 提交于
      Rename BUF_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
      to OPENSSL_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
      Add #define's for the old names.
      Add CRYPTO_{memdup,strndup}, called by OPENSSL_{memdup,strndup} macros.
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      7644a9ae
  3. 11 9月, 2015 1 次提交
  4. 23 5月, 2015 1 次提交
  5. 13 5月, 2015 1 次提交
  6. 05 5月, 2015 1 次提交
  7. 02 5月, 2015 1 次提交
  8. 01 5月, 2015 1 次提交
  9. 11 4月, 2015 1 次提交
  10. 03 4月, 2015 1 次提交
  11. 28 2月, 2015 1 次提交
    • M
      Fix d2i_SSL_SESSION for DTLS1_BAD_VER · af674d4e
      Matt Caswell 提交于
      Some Cisco appliances use a pre-standard version number for DTLS. We support
      this as DTLS1_BAD_VER within the code.
      
      This change fixes d2i_SSL_SESSION for that DTLS version.
      
      Based on an original patch by David Woodhouse <dwmw2@infradead.org>
      
      RT#3704
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      af674d4e
  12. 11 2月, 2015 1 次提交
    • M
      Correct reading back of tlsext_tick_lifetime_hint from ASN1. · ea6bd264
      Matt Caswell 提交于
      When writing out the hint, if the hint > 0, then we write it out otherwise
      we skip it.
      
      Previously when reading the hint back in, if were expecting to see one
      (because the ticket length > 0), but it wasn't present then we set the hint
      to -1, otherwise we set it to 0. This fails to set the hint to the same as
      when it was written out.
      
      The hint should never be negative because the RFC states the hint is
      unsigned. It is valid for a server to set the hint to 0 (this means the
      lifetime is unspecified according to the RFC). If the server set it to 0, it
      should still be 0 when we read it back in.
      Reviewed-by: NTim Hudson <tjh@openssl.org>
      ea6bd264
  13. 03 2月, 2015 1 次提交
  14. 22 1月, 2015 1 次提交
  15. 04 12月, 2014 1 次提交
  16. 08 5月, 2014 1 次提交
  17. 04 6月, 2012 1 次提交
  18. 25 10月, 2011 1 次提交
  19. 05 9月, 2011 1 次提交
  20. 13 3月, 2011 1 次提交
  21. 17 2月, 2011 1 次提交
  22. 12 6月, 2010 1 次提交
  23. 02 2月, 2010 1 次提交
    • D
      PR: 2160 · 434745dc
      Dr. Stephen Henson 提交于
      Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de>
      
      Make session tickets work with DTLS.
      434745dc
  24. 30 10月, 2009 2 次提交
  25. 02 9月, 2009 1 次提交
    • D
      PR: 2009 · 3d9b105f
      Dr. Stephen Henson 提交于
      Submitted by: "Alexei Khlebnikov" <alexei.khlebnikov@opera.com>
      Approved by: steve@openssl.org
      
      Avoid memory leak and fix error reporting in d2i_SSL_SESSION(). NB: although
      the ticket mentions buffer overruns this isn't a security issue because
      the SSL_SESSION structure is generated internally and it should never be
      possible to supply its contents from an untrusted application (this would
      among other things destroy session cache security).
      3d9b105f
  26. 05 8月, 2009 1 次提交
  27. 01 7月, 2009 1 次提交
  28. 13 11月, 2008 1 次提交
  29. 12 11月, 2008 1 次提交
  30. 02 11月, 2008 1 次提交
  31. 14 9月, 2008 1 次提交
  32. 17 10月, 2007 1 次提交
  33. 13 8月, 2007 1 次提交
  34. 12 8月, 2007 1 次提交
  35. 06 4月, 2006 1 次提交
  36. 30 3月, 2006 1 次提交
  37. 26 3月, 2006 1 次提交
  38. 13 3月, 2006 1 次提交
  39. 12 3月, 2006 1 次提交