- 30 10月, 2009 2 次提交
-
-
由 Dr. Stephen Henson 提交于
of when a session is loaded. This will mean that applications that just hold onto SSL_SESSION structures and never call d2i_SSL_SESSION() will still work.
-
由 Dr. Stephen Henson 提交于
-
- 02 9月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: "Alexei Khlebnikov" <alexei.khlebnikov@opera.com> Approved by: steve@openssl.org Avoid memory leak and fix error reporting in d2i_SSL_SESSION(). NB: although the ticket mentions buffer overruns this isn't a security issue because the SSL_SESSION structure is generated internally and it should never be possible to supply its contents from an untrusted application (this would among other things destroy session cache security).
-
- 05 8月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 01 7月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 13 11月, 2008 1 次提交
-
-
由 Ben Laurie 提交于
-
- 12 11月, 2008 1 次提交
-
-
由 Geoff Thorpe 提交于
knock-on work than expected - they've been extracted into a patch series that can be completed elsewhere, or in a different branch, before merging back to HEAD.
-
- 02 11月, 2008 1 次提交
-
-
由 Ben Laurie 提交于
-
- 14 9月, 2008 1 次提交
-
-
由 Bodo Möller 提交于
-
- 17 10月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 13 8月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 12 8月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
for OpenSSL.
-
- 06 4月, 2006 1 次提交
-
-
由 Bodo Möller 提交于
of the session -- we don't really need it once the handshake has completed.
-
- 30 3月, 2006 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Douglas Stebila
-
- 26 3月, 2006 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Douglas Stebila
-
- 13 3月, 2006 1 次提交
-
-
由 Richard Levitte 提交于
-
- 12 3月, 2006 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Douglas Stebila
-
- 11 3月, 2006 1 次提交
-
-
由 Nils Larsch 提交于
PR: 1191 Submitted by: Mika Kousa and Pasi Eronen of Nokia Corporation Reviewed by: Nils Larsch
-
- 04 1月, 2006 1 次提交
-
-
由 Richard Levitte 提交于
-
- 03 1月, 2006 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Peter Sylvester
-
- 06 12月, 2005 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 21 4月, 2005 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Avoid more shadow warnings.
-
- 02 4月, 2005 1 次提交
-
-
由 Nils Larsch 提交于
PR: 658
-
- 31 3月, 2005 1 次提交
-
-
由 Ben Laurie 提交于
-
- 30 3月, 2005 1 次提交
-
-
由 Ben Laurie 提交于
-
- 28 12月, 2003 1 次提交
-
-
由 Richard Levitte 提交于
Check if IDEA is being built or not. This is part of a large change submitted by Markus Friedl <markus@openbsd.org>
-
- 30 10月, 2003 1 次提交
-
-
由 Geoff Thorpe 提交于
I have tried to convert 'len' type variable declarations to unsigned as a means to address these warnings when appropriate, but when in doubt I have used casts in the comparisons instead. The better solution (that would get us all lynched by API users) would be to go through and convert all the function prototypes and structure definitions to use unsigned variables except when signed is necessary. The proliferation of (signed) "int" for strictly non-negative uses is unfortunate.
-
- 13 11月, 2002 1 次提交
-
-
由 Ben Laurie 提交于
-
- 02 8月, 2002 1 次提交
-
-
由 Bodo Möller 提交于
-
- 30 7月, 2002 1 次提交
-
-
由 Lutz Jänicke 提交于
Changes marked "(CHATS)" were sponsored by the Defense Advanced Research Projects Agency (DARPA) and Air Force Research Laboratory, Air Force Materiel Command, USAF, under agreement number F30602-01-2-0537.
-
- 10 7月, 2002 1 次提交
-
-
由 Lutz Jänicke 提交于
des_old.h redefines crypt: #define crypt(b,s)\ DES_crypt((b),(s)) This scheme leads to failure, if header files with the OS's true definition of crypt() are processed _after_ des_old.h was processed. This is e.g. the case on HP-UX with unistd.h. As evp.h now again includes des.h (which includes des_old.h), this problem only came up after this modification. Solution: move header files (indirectly) including e_os.h before the header files (indirectly) including evp.h. Submitted by: Reviewed by: PR:
-
- 12 3月, 2002 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Fix ASN1 additions for KRB5
-
- 31 7月, 2001 1 次提交
-
-
由 Richard Levitte 提交于
His comments are: First, it corrects a problem introduced in the last patch where the kssl_map_enc() would intentionally return NULL for valid ENCTYPE values. This was done to prevent verification of the kerberos 5 authenticator from being performed when Derived Key ciphers were in use. Unfortunately, the authenticator verification routine was not the only place that function was used. And it caused core dumps. Second, it attempt to add to SSL_SESSION the Kerberos 5 Client Principal Name.
-
- 02 6月, 2000 1 次提交
-
-
由 Richard Levitte 提交于
like Malloc, Realloc and especially Free conflict with already existing names on some operating systems or other packages. That is reason enough to change the names of the OpenSSL memory allocation macros to something that has a better chance of being unique, like prepending them with OPENSSL_. This change includes all the name changes needed throughout all C files.
-
- 04 2月, 2000 1 次提交
-
-
由 Ulf Möller 提交于
-
- 17 11月, 1999 1 次提交
-
-
由 Bodo Möller 提交于
-
- 27 4月, 1999 1 次提交
-
-
由 Ulf Möller 提交于
-
- 24 4月, 1999 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Reviewed by: PR:
-
- 20 4月, 1999 1 次提交
-
-
由 Ulf Möller 提交于
-
- 22 3月, 1999 1 次提交
-
-
由 Ben Laurie 提交于
-