1. 05 4月, 2016 1 次提交
  2. 10 3月, 2016 2 次提交
  3. 27 1月, 2016 1 次提交
    • R
      Remove /* foo.c */ comments · 34980760
      Rich Salz 提交于
      This was done by the following
              find . -name '*.[ch]' | /tmp/pl
      where /tmp/pl is the following three-line script:
              print unless $. == 1 && m@/\* .*\.[ch] \*/@;
              close ARGV if eof; # Close file to reset $.
      
      And then some hand-editing of other files.
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      34980760
  4. 03 10月, 2015 1 次提交
  5. 23 5月, 2015 1 次提交
  6. 13 5月, 2015 1 次提交
  7. 12 5月, 2015 1 次提交
    • R
      Make COMP_CTX and COMP_METHOD opaque · 9a555706
      Rich Salz 提交于
      Since COMP_METHOD is now defined in comp_lcl.h, it is no
      longer possible to create new TLS compression methods without
      using the OpenSSL source.  Only ZLIB is supported by default.
      Also, since the types are opaque, #ifdef guards to use "char *"
      instead of the real type aren't necessary.
      
      The changes are actually minor.  Adding missing copyright to some
      files makes the diff misleadingly big.
      Reviewed-by: NMatt Caswell <matt@openssl.org>
      9a555706
  8. 17 4月, 2015 1 次提交
  9. 23 3月, 2015 1 次提交
  10. 03 2月, 2015 1 次提交
  11. 22 1月, 2015 1 次提交
  12. 15 1月, 2015 1 次提交
    • R
      Cleanup OPENSSL_NO_xxx, part 1 · 4b618848
      Rich Salz 提交于
      OPENSSL_NO_RIPEMD160, OPENSSL_NO_RIPEMD merged into OPENSSL_NO_RMD160
      OPENSSL_NO_FP_API merged into OPENSSL_NO_STDIO
      Two typo's on #endif comments fixed:
      	OPENSSL_NO_ECB fixed to OPENSSL_NO_OCB
      	OPENSSL_NO_HW_SureWare fixed to OPENSSL_NO_HW_SUREWARE
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      4b618848
  13. 04 12月, 2014 1 次提交
  14. 24 5月, 2014 1 次提交
  15. 08 9月, 2013 1 次提交
    • D
      Experimental encrypt-then-mac support. · 5e3ff62c
      Dr. Stephen Henson 提交于
      Experimental support for encrypt then mac from
      draft-gutmann-tls-encrypt-then-mac-02.txt
      
      To enable it set the appropriate extension number (0x10 for the test server)
      using e.g. -DTLSEXT_TYPE_encrypt_then_mac=0x10
      
      For non-compliant peers (i.e. just about everything) this should have no
      effect.
      5e3ff62c
  16. 26 3月, 2013 1 次提交
    • D
      Provisional DTLS 1.2 support. · c3b344e3
      Dr. Stephen Henson 提交于
      Add correct flags for DTLS 1.2, update s_server and s_client to handle
      DTLS 1.2 methods.
      
      Currently no support for version negotiation: i.e. if client/server selects
      DTLS 1.2 it is that or nothing.
      c3b344e3
  17. 30 4月, 2011 1 次提交
  18. 13 3月, 2011 1 次提交
  19. 07 12月, 2009 1 次提交
  20. 01 7月, 2009 1 次提交
  21. 14 5月, 2009 1 次提交
  22. 12 8月, 2007 1 次提交
  23. 05 6月, 2007 1 次提交
  24. 11 3月, 2006 1 次提交
  25. 01 10月, 2005 1 次提交
  26. 27 7月, 2005 1 次提交
  27. 30 3月, 2005 1 次提交
  28. 21 3月, 2005 1 次提交
  29. 12 3月, 2002 1 次提交
    • D
      · 98fa4fe8
      Dr. Stephen Henson 提交于
      Fix ASN1 additions for KRB5
      98fa4fe8
  30. 31 7月, 2001 1 次提交
    • R
      More Kerberos SSL changes from Jeffrey Altman <jaltman@columbia.edu> · 882e8912
      Richard Levitte 提交于
      His comments are:
      
      First, it corrects a problem introduced in the last patch where the
      kssl_map_enc() would intentionally return NULL for valid ENCTYPE
      values.  This was done to prevent verification of the kerberos 5
      authenticator from being performed when Derived Key ciphers were
      in use.  Unfortunately, the authenticator verification routine was
      not the only place that function was used.  And it caused core dumps.
      
      Second, it attempt to add to SSL_SESSION the Kerberos 5 Client
      Principal Name.
      882e8912
  31. 20 2月, 2001 1 次提交
  32. 21 5月, 2000 1 次提交
  33. 13 3月, 2000 1 次提交
  34. 09 1月, 2000 1 次提交
  35. 08 6月, 1999 1 次提交
  36. 24 4月, 1999 1 次提交
  37. 20 4月, 1999 1 次提交
  38. 22 3月, 1999 1 次提交
  39. 16 2月, 1999 1 次提交
    • M
      Updates to the new SSL compression code · 413c4f45
      Mark J. Cox 提交于
           [Eric A. Young, (from changes to C2Net SSLeay, integrated by Mark Cox)]
      
      Fix so that the version number in the master secret, when passed
           via RSA, checks that if TLS was proposed, but we roll back to SSLv3
           (because the server will not accept higher), that the version number
           is 0x03,0x01, not 0x03,0x00
           [Eric A. Young, (from changes to C2Net SSLeay, integrated by Mark Cox)]
      
      Submitted by:
      Reviewed by:
      PR:
      413c4f45