- 20 4月, 2004 1 次提交
-
-
由 Geoff Thorpe 提交于
tree. This further reduces header interdependencies, and makes some associated cleanups.
-
- 16 3月, 2004 1 次提交
-
-
由 Richard Levitte 提交于
functions and macros. This change has associated tags: LEVITTE_before_const and LEVITTE_after_const. Those will be removed when this change has been properly reviewed.
-
- 28 12月, 2003 1 次提交
-
-
由 Richard Levitte 提交于
Check if IDEA is being built or not. This is part of a large change submitted by Markus Friedl <markus@openbsd.org>
-
- 29 11月, 2003 1 次提交
-
-
由 Richard Levitte 提交于
compared it to the amount of bits required... PR: 770 Submitted by: c zhang <czhang2005@hotmail.com>
-
- 30 10月, 2003 1 次提交
-
-
由 Geoff Thorpe 提交于
I have tried to convert 'len' type variable declarations to unsigned as a means to address these warnings when appropriate, but when in doubt I have used casts in the comparisons instead. The better solution (that would get us all lynched by API users) would be to go through and convert all the function prototypes and structure definitions to use unsigned variables except when signed is necessary. The proliferation of (signed) "int" for strictly non-negative uses is unfortunate.
-
- 28 9月, 2003 1 次提交
-
-
由 Richard Levitte 提交于
PR: 679
-
- 22 7月, 2003 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Douglas Stebila Reviewed by: Bodo Moeller
-
- 28 2月, 2003 2 次提交
-
-
由 Bodo Möller 提交于
- bugfix: in ECDH_compute_key, pad x coordinate with leading zeros if necessary
-
由 Bodo Möller 提交于
-
- 22 12月, 2002 1 次提交
-
-
由 Richard Levitte 提交于
(I wonder why s2_connect() handles the initial buffer allocation slightly differently...) PR: 416
-
- 28 11月, 2002 1 次提交
-
-
由 Richard Levitte 提交于
I've covered all the memset()s I felt safe modifying, but may have missed some.
-
- 20 11月, 2002 1 次提交
-
-
由 Lutz Jänicke 提交于
caching (#288): now internal caching failed (#351): Make sure, that cipher_id is set before comparing. Submitted by: Reviewed by: PR: 288 (and 351)
-
- 15 11月, 2002 1 次提交
-
-
由 Lutz Jänicke 提交于
from external cache (using d2i_SSL_SESSION). Perform comparison based on the cipher's id instead. Submitted by: Steve Haslam <araqnid@innocent.com> Reviewed by: PR: 288
-
- 13 11月, 2002 1 次提交
-
-
由 Ben Laurie 提交于
-
- 29 10月, 2002 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Sheueling Chang <Sheueling.Chang@Sun.COM>
-
- 25 9月, 2002 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: "Patrick McCormick" <patrick@tellme.com> PR: 262 PR: 291
-
- 23 9月, 2002 1 次提交
-
-
由 Bodo Möller 提交于
PR: 262
-
- 19 9月, 2002 2 次提交
-
-
由 Bodo Möller 提交于
PR: 274
-
由 Bodo Möller 提交于
PR: 262
-
- 12 8月, 2002 2 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Douglas Stebila
-
由 Bodo Möller 提交于
Submitted by: Nils Larsch
-
- 09 8月, 2002 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Douglas Stebila <douglas.stebila@sun.com> (Authors: Vipul Gupta and Sumit Gupta, Sun Microsystems Laboratories)
-
- 02 8月, 2002 1 次提交
-
-
由 Bodo Möller 提交于
-
- 30 7月, 2002 1 次提交
-
-
由 Lutz Jänicke 提交于
Changes marked "(CHATS)" were sponsored by the Defense Advanced Research Projects Agency (DARPA) and Air Force Research Laboratory, Air Force Materiel Command, USAF, under agreement number F30602-01-2-0537.
-
- 10 7月, 2002 1 次提交
-
-
由 Lutz Jänicke 提交于
des_old.h redefines crypt: #define crypt(b,s)\ DES_crypt((b),(s)) This scheme leads to failure, if header files with the OS's true definition of crypt() are processed _after_ des_old.h was processed. This is e.g. the case on HP-UX with unistd.h. As evp.h now again includes des.h (which includes des_old.h), this problem only came up after this modification. Solution: move header files (indirectly) including e_os.h before the header files (indirectly) including evp.h. Submitted by: Reviewed by: PR:
-
- 15 3月, 2002 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Initialize cipher context in KRB5 ("D. Russell" <russelld@aol.net>) Allow HMAC functions to use an alternative ENGINE.
-
- 15 1月, 2002 1 次提交
-
-
由 Bodo Möller 提交于
to indicate that a real handshake is taking place (the value will be lost during multiple invocations). Set s->new_session to 2 instead.
-
- 14 1月, 2002 1 次提交
-
-
由 Bodo Möller 提交于
the SSL_R_LENGTH_MISMATCH error is detected.
-
- 12 1月, 2002 1 次提交
-
-
由 Ben Laurie 提交于
-
- 25 10月, 2001 2 次提交
-
-
由 Bodo Möller 提交于
change)
-
由 Bodo Möller 提交于
never resets s->method to s->ctx->method when called from within one of the SSL handshake functions.
-
- 18 10月, 2001 1 次提交
-
-
由 Richard Levitte 提交于
it to NULL.
-
- 17 10月, 2001 1 次提交
-
-
由 Dr. Stephen Henson 提交于
to digests to retain compatibility.
-
- 16 10月, 2001 2 次提交
-
-
由 Dr. Stephen Henson 提交于
Retain compatibility of EVP_DigestInit() and EVP_DigestFinal() with existing code. Modify library to use digest *_ex() functions.
-
由 Bodo Möller 提交于
'Handshake' protocol structures are kept in memory, including 'msg_type' and 'length'. (This is in preparation of future support for callbacks that get to peek at handshake messages and the like.)
-
- 10 10月, 2001 1 次提交
-
-
由 Richard Levitte 提交于
depend on the environment, like the presence of the OpenBSD crypto device or of Kerberos, do not change the dependencies within OpenSSL.
-
- 11 9月, 2001 1 次提交
-
-
由 Lutz Jänicke 提交于
settable (proposed by "Douglas E. Engert" <deengert@anl.gov>).
-
- 07 8月, 2001 1 次提交
-
-
由 Bodo Möller 提交于
ServerKeyExchange message may be skipped. Submitted by: Petr Lampa <lampa@fee.vutbr.cz>
-
- 31 7月, 2001 2 次提交
-
-
由 Richard Levitte 提交于
His comments are: First, it corrects a problem introduced in the last patch where the kssl_map_enc() would intentionally return NULL for valid ENCTYPE values. This was done to prevent verification of the kerberos 5 authenticator from being performed when Derived Key ciphers were in use. Unfortunately, the authenticator verification routine was not the only place that function was used. And it caused core dumps. Second, it attempt to add to SSL_SESSION the Kerberos 5 Client Principal Name.
-
由 Ben Laurie 提交于
-