- 26 2月, 2001 1 次提交
-
-
由 Richard Levitte 提交于
-
- 25 2月, 2001 1 次提交
-
-
由 Dr. Stephen Henson 提交于
the errant field for more ASN1 error conditions.
-
- 24 2月, 2001 7 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
Print out OID of unknown signature or public key algorithms.
-
由 Dr. Stephen Henson 提交于
key algorithms and leaking if the signature verify fails.
-
由 Lutz Jänicke 提交于
-
由 Lutz Jänicke 提交于
-
由 Ulf Möller 提交于
like to use libtool, but not automake. Let's investigate that further, or leave the question open for now.
-
由 Ulf Möller 提交于
-
- 23 2月, 2001 11 次提交
-
-
由 Dr. Stephen Henson 提交于
or serial number.
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
prototype hack. This unfortunately means that every ASN1_*_END construct cannot have a trailing ;
-
由 Richard Levitte 提交于
-
由 Dr. Stephen Henson 提交于
change the way ASN1 modules are exported. Still needs a bit of work for example the hack which a dummy function prototype to avoid compilers warning about multiple ;s.
-
由 Geoff Thorpe 提交于
-
由 Geoff Thorpe 提交于
an SSL_CTX's session cache, it is necessary to compare the ssl_version at the same time (a conflict is defined, courtesy of SSL_SESSION_cmp(), as a matching id/id_length pair and a matching ssl_version). However, the SSL_SESSION that will result from the current negotiation does not necessarily have the same ssl version as the "SSL_METHOD" in use by the SSL_CTX - part of the work in a handshake is to agree on an ssl version! This is fixed by having the check function accept an SSL pointer rather than the SSL_CTX it belongs to. [Thanks to Lutz for illuminating the full extent of my stupidity]
-
由 Richard Levitte 提交于
Define the right macro for Linux and other GNU-based systems to get a correct declaration of strdup()
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
really see why we need to define these function pointers with MS_FAR if it's not done cosistently everywhere. If we decide to support MS_FAR modifiers, it's better to have the named something more unique for OpenSSL and to define them in e_os2.h.
-
由 Richard Levitte 提交于
Define the OPENSSL_NO_* macros as NO_* macros for the sake of applications thathaven't yet been changed
-
- 22 2月, 2001 20 次提交
-
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
to include (but the OpenSSL_0_9_6-stable branche still has inconsistencies)
-
由 Bodo Möller 提交于
-
由 Richard Levitte 提交于
and make all files the depend on it include it without prefixing it with openssl/. This means that all Makefiles will have $(TOP) as one of the include directories.
-
由 Richard Levitte 提交于
compared to it has the type size_t. Included the needed headers to make that happen.
-
由 Richard Levitte 提交于
defined there.
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
OPENSSL_UNISTD before redefining it, to avoid compiler warnings.
-
由 Richard Levitte 提交于
pre-CRYPTO_MEM_LEAK_CB time.
-
由 Richard Levitte 提交于
make strcasecmp a macro to _stricmp.
-
由 Richard Levitte 提交于
The reason is that some parts are only included when certain other include files have been included. Also, it seems that the rest of the OpenSSL code assumes that all kinds of M$ Windows are MSDOS as well...
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
there's no point creating an alias for it.
-
由 Richard Levitte 提交于
SSL_add_dir_cert_subjects_to_stack is not implemented on WIN32 and VMS, so declare it the same way.
-
由 Dr. Stephen Henson 提交于
Rebuild ASN1 error codes to remove unused function and reason codes.
-
由 Geoff Thorpe 提交于
the ID will be padded out to 16 bytes if the callback attempted to generate a shorter one. The problem is that the uniqueness checking function used in callbacks may mistakenly think a 9-byte ID is unique when in fact its padded 16-byte version is not. This makes the checking function detect SSLv2 cases, and ensures the padded form is checked rather than the shorter one passed by the callback.
-
由 Geoff Thorpe 提交于
-
由 Geoff Thorpe 提交于
of session IDs. Namely, passing "-id_prefix <text>" will set a generate_session_id() callback that generates session IDs as random data with <text> block-copied over the top of the start of the ID. This can be viewed by watching the session ID s_client's output when it connects. This is mostly useful for testing any SSL/TLS code (eg. proxies) that wish to deal with multiple servers, when each of which might be generating a unique range of session IDs (eg. with a certain prefix).
-
由 Geoff Thorpe 提交于
SSL/TLS session IDs in a server. According to RFC2246, the session ID is an arbitrary value chosen by the server. It can be useful to have some control over this "arbitrary value" so as to choose it in ways that can aid in things like external session caching and balancing (eg. clustering). The default session ID generation is to fill the ID with random data. The callback used by default is built in to ssl_sess.c, but registering a callback in an SSL_CTX or in a particular SSL overrides this. BTW: SSL callbacks will override SSL_CTX callbacks, and a new SSL structure inherits any callback set in its 'parent' SSL_CTX. The header comments describe how this mechanism ticks, and source code comments describe (hopefully) why it ticks the way it does. Man pages are on the way ... [NB: Lutz was also hacking away and helping me to figure out how best to do this.]
-
由 Geoff Thorpe 提交于
-