- 07 6月, 2012 1 次提交
-
-
由 Ben Laurie 提交于
-
- 30 5月, 2012 1 次提交
-
-
由 Ben Laurie 提交于
-
- 17 1月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
The cipher definitions of these ciphersuites have been around since SSLeay but were always disabled. Now OpenSSL supports DH certificates they can be finally enabled. Various additional changes were needed to make them work properly: many unused fixed DH sections of code were untested.
-
- 13 9月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: steve@openssl.org Allow use of trusted certificates in SSL_CTX_use_chain_file()
-
- 26 5月, 2008 1 次提交
-
-
由 Lutz Jänicke 提交于
about "overcommenting".
-
- 23 5月, 2008 1 次提交
-
-
由 Lutz Jänicke 提交于
PR: 1417, 1513 Submitted by: Erik de Castro Lopo <mle+openssl@mega-nerd.com>
-
- 09 4月, 2005 1 次提交
-
-
由 Nils Larsch 提交于
and SSL_use_PrivateKey_file() PR: 1035 Submitted by: Walter Goulet Reviewed by: Nils Larsch
-
- 08 4月, 2005 1 次提交
-
-
由 Nils Larsch 提交于
Reviewed by: Bodo Moeller
-
- 02 4月, 2005 1 次提交
-
-
由 Nils Larsch 提交于
PR: 860
-
- 16 3月, 2004 1 次提交
-
-
由 Richard Levitte 提交于
functions and macros. This change has associated tags: LEVITTE_before_const and LEVITTE_after_const. Those will be removed when this change has been properly reviewed.
-
- 12 8月, 2003 1 次提交
-
-
由 Bodo Möller 提交于
-
- 10 7月, 2002 1 次提交
-
-
由 Lutz Jänicke 提交于
des_old.h redefines crypt: #define crypt(b,s)\ DES_crypt((b),(s)) This scheme leads to failure, if header files with the OS's true definition of crypt() are processed _after_ des_old.h was processed. This is e.g. the case on HP-UX with unistd.h. As evp.h now again includes des.h (which includes des_old.h), this problem only came up after this modification. Solution: move header files (indirectly) including e_os.h before the header files (indirectly) including evp.h. Submitted by: Reviewed by: PR:
-
- 28 2月, 2002 1 次提交
-
-
由 Bodo Möller 提交于
-
- 03 9月, 2001 1 次提交
-
-
由 Bodo Möller 提交于
[DR]SA_up => [DR]SA_up_ref
-
- 26 8月, 2001 1 次提交
-
-
由 Geoff Thorpe 提交于
counts in DH, DSA, and RSA structures. Instead they use the new "***_up()" functions that handle this.
-
- 20 2月, 2001 1 次提交
-
-
由 Richard Levitte 提交于
missed any. This compiles and runs on Linux, and external applications have no problems with it. The definite test will be to build this on VMS.
-
- 07 11月, 2000 1 次提交
-
-
由 Richard Levitte 提交于
pointer to a const double pointe parameter, the pointer must point to const data as well.
-
- 05 8月, 1999 1 次提交
-
-
由 Ralf S. Engelschall 提交于
-
- 22 7月, 1999 1 次提交
-
-
由 Bodo Möller 提交于
and to lots of PEM_... functions. Submitted by: Damien Miller <dmiller@ilogic.com.au>
-
- 10 5月, 1999 1 次提交
-
-
由 Bodo Möller 提交于
pointers. The cert_st handling is changed by this in various ways. Submitted by: Reviewed by: PR:
-
- 09 5月, 1999 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Reviewed by: PR:
-
- 02 5月, 1999 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Reviewed by: PR:
-
- 27 4月, 1999 1 次提交
-
-
由 Ulf Möller 提交于
-
- 24 4月, 1999 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Reviewed by: PR:
-
- 20 4月, 1999 1 次提交
-
-
由 Ulf Möller 提交于
-
- 25 2月, 1999 1 次提交
-
-
由 Ralf S. Engelschall 提交于
private keys and/or callback functions which directly correspond to their SSL_CTX_xxx() counterparts but work on a per-connection basis. This is needed for applications which have to configure certificates on a per-connection basis (e.g. Apache+mod_ssl) instead of a per-context basis (e.g. s_server). For the RSA certificate situation is makes no difference, but for the DSA certificate situation this fixes the "no shared cipher" problem where the OpenSSL cipher selection procedure failed because the temporary keys were not overtaken from the context and the API provided no way to reconfigure them. The new functions now let applications reconfigure the stuff and they are in detail: SSL_need_tmp_RSA, SSL_set_tmp_rsa, SSL_set_tmp_dh, SSL_set_tmp_rsa_callback and SSL_set_tmp_dh_callback. Additionally a new non-public-API function ssl_cert_instantiate() is used as a helper function and also to reduce code redundancy inside ssl_rsa.c. Submitted by: Ralf S. Engelschall Reviewed by: Ben Laurie
-
- 16 2月, 1999 2 次提交
-
-
由 Mark J. Cox 提交于
[Eric A. Young, (from changes to C2Net SSLeay, integrated by Mark Cox)] Fix so that the version number in the master secret, when passed via RSA, checks that if TLS was proposed, but we roll back to SSLv3 (because the server will not accept higher), that the version number is 0x03,0x01, not 0x03,0x00 [Eric A. Young, (from changes to C2Net SSLeay, integrated by Mark Cox)] Submitted by: Reviewed by: PR:
-
由 Dr. Stephen Henson 提交于
-
- 21 12月, 1998 3 次提交
-
-
由 Ralf S. Engelschall 提交于
-
由 Ralf S. Engelschall 提交于
-
由 Ralf S. Engelschall 提交于
-