- 10 12月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Initial secure renegotiation documentation.
-
- 09 12月, 2009 7 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
Submitted by: Jan Pechanec <Jan.Pechanec@Sun.COM> Check for memory allocation failures.
-
由 Dr. Stephen Henson 提交于
Change RI ctrl so it doesn't clash.
-
由 Dr. Stephen Henson 提交于
-
- 08 12月, 2009 3 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
work in SSLv3: initial handshake has no extensions but includes MCSV, if server indicates RI support then renegotiation handshakes include RI. NB: current MCSV value is bogus for testing only, will be updated when we have an official value. Change mismatch alerts to handshake_failure as required by spec. Also have some debugging fprintfs so we can clearly see what is going on if OPENSSL_RI_DEBUG is set.
-
由 Dr. Stephen Henson 提交于
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Add extension support to DTLS code mainly using existing implementation for TLS.
-
- 07 12月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 02 12月, 2009 9 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Martin Olsson <molsson@opera.com> Check for bn_wexpand errors in bn_mul.c
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
Submitted by: steve@openssl.org Initialize fields correctly if pem_str or info are NULL in EVP_PKEY_asn1_new().
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Approved by: steve@openssl.org Add Renegotiation extension to DTLS, fix DTLS ClientHello processing bug.
-
由 Dr. Stephen Henson 提交于
Submitted by: "Andrzej Chmielowiec" <achmielowiec@enigma.com.pl>, steve@openssl.org Approved by: steve@openssl.org Truncate hash if it is too large: as required by FIPS 186-3.
-
- 30 11月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Mounir IDRASSI <mounir.idrassi@idrix.net> Approved by: steve@openssl.org Check return value of ECDSA_sign() properly.
-
- 29 11月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 27 11月, 2009 3 次提交
-
-
由 Andy Polyakov 提交于
PR: 2110
-
由 Dr. Stephen Henson 提交于
-
由 Bodo Möller 提交于
branches. This means that http://www.openssl.org/news/changelog.html will finally describe 0.9.8l.
-
- 26 11月, 2009 3 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
and is a pre-requisite to adding password based CMS support.
-
- 24 11月, 2009 1 次提交
-
-
由 Andy Polyakov 提交于
PR: 2107
-
- 20 11月, 2009 1 次提交
-
-
由 Andy Polyakov 提交于
eliminate duplicate code. PR: 2086
-
- 18 11月, 2009 3 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 17 11月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Rob Austein <sra@hactrn.net> Approved by: steve@openssl.org Initialise atm.flags to 0.
-
- 16 11月, 2009 5 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Roumen Petrov <openssl@roumenpetrov.info> Approved by: steve@openssl.org Another mingw fix.
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
forgotten CPUs.
-
由 Andy Polyakov 提交于
inline 64-bit assembler instructions. Normally it's inappropriate, because signalling doesn't preserve upper halves of general purpose registers. Meaning that it's only safe if signals are blocked for the time "wide" code executes. PR: 1998
-