1. 14 7月, 2018 1 次提交
  2. 25 8月, 2017 1 次提交
  3. 18 5月, 2016 1 次提交
  4. 27 1月, 2016 1 次提交
    • R
      Remove /* foo.c */ comments · 34980760
      Rich Salz 提交于
      This was done by the following
              find . -name '*.[ch]' | /tmp/pl
      where /tmp/pl is the following three-line script:
              print unless $. == 1 && m@/\* .*\.[ch] \*/@;
              close ARGV if eof; # Close file to reset $.
      
      And then some hand-editing of other files.
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      34980760
  5. 14 5月, 2015 1 次提交
  6. 22 1月, 2015 1 次提交
  7. 08 12月, 2014 1 次提交
  8. 04 2月, 2011 1 次提交
  9. 18 7月, 2008 1 次提交
  10. 07 11月, 2000 1 次提交
  11. 30 7月, 2000 1 次提交
    • B
      Fix SSL 2.0 rollback checking: The previous implementation of the · 37569e64
      Bodo Möller 提交于
      test was never triggered due to an off-by-one error.
      
      In s23_clnt.c, don't use special rollback-attack detection padding
      (RSA_SSLV23_PADDING) if SSL 2.0 is the only protocol enabled in the
      client; similarly, in s23_srvr.c, don't do the rollback check if
      SSL 2.0 is the only protocol enabled in the server.
      37569e64
  12. 22 2月, 2000 1 次提交
  13. 14 1月, 2000 1 次提交
  14. 24 4月, 1999 1 次提交
  15. 20 4月, 1999 1 次提交
  16. 21 12月, 1998 3 次提交