1. 26 5月, 2013 3 次提交
  2. 14 5月, 2013 1 次提交
  3. 13 5月, 2013 2 次提交
  4. 05 5月, 2013 2 次提交
  5. 02 5月, 2013 1 次提交
  6. 23 4月, 2013 2 次提交
  7. 14 4月, 2013 3 次提交
    • D
      Typo. · 412834dc
      Dr. Stephen Henson 提交于
      412834dc
    • A
      Fix Windows linking error in GOST test case. · db05b447
      Andy Polyakov 提交于
      db05b447
    • A
      crypto/modes/modes_lcl.h: let STRICT_ALIGNMENT be on ARMv7. · 3bdd8052
      Andy Polyakov 提交于
      While ARMv7 in general is capable of unaligned access, not all instructions
      actually are. And trouble is that compiler doesn't seem to differentiate
      those capable and incapable of unaligned access. Side effect is that kernel
      goes into endless loop retrying same instruction triggering unaligned trap.
      Problem was observed in xts128.c and ccm128.c modules. It's possible to
      resolve it by using (volatile u32*) casts, but letting STRICT_ALIGNMENT
      be feels more appropriate.
      3bdd8052
  8. 09 4月, 2013 4 次提交
    • D
      Suite B support for DTLS 1.2 · 4544f0a6
      Dr. Stephen Henson 提交于
      Check for Suite B support using method flags instead of version numbers:
      anything supporting TLS 1.2 cipher suites will also support Suite B.
      
      Return an error if an attempt to use DTLS 1.0 is made in Suite B mode.
      4544f0a6
    • D
      Always return errors in ssl3_get_client_hello · c56f5b8e
      Dr. Stephen Henson 提交于
      If we successfully match a cookie don't set return value to 2 as this
      results in other error conditions returning 2 as well.
      
      Instead set return value to -2 which can be checked later if everything
      else is OK.
      c56f5b8e
    • D
      Dual DTLS version methods. · c6913eeb
      Dr. Stephen Henson 提交于
      Add new methods DTLS_*_method() which support both DTLS 1.0 and DTLS 1.2 and
      pick the highest version the peer supports during negotiation.
      
      As with SSL/TLS options can change this behaviour specifically
      SSL_OP_NO_DTLSv1 and SSL_OP_NO_DTLSv1_2.
      c6913eeb
    • D
      Set s->d1 to NULL after freeing it. · 04638f2f
      Dr. Stephen Henson 提交于
      04638f2f
  9. 08 4月, 2013 1 次提交
  10. 07 4月, 2013 2 次提交
  11. 06 4月, 2013 18 次提交
  12. 05 4月, 2013 1 次提交
    • D
      Make TLS 1.2 ciphers work again. · 1e2d4cb0
      Dr. Stephen Henson 提交于
      Since s->method does not reflect the final client version when a client
      hello is sent for SSLv23_client_method it can't be relied on to indicate
      if TLS 1.2 ciphers should be used. So use the client version instead.
      1e2d4cb0