- 08 12月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
- 04 2月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
that use it.
-
- 18 7月, 2008 1 次提交
-
-
由 Bodo Möller 提交于
detection, or the probability for an erroneous RSA_R_SSLV3_ROLLBACK_ATTACK will be larger than necessary. PR: 1695
-
- 07 11月, 2000 1 次提交
-
-
由 Richard Levitte 提交于
-
- 30 7月, 2000 1 次提交
-
-
由 Bodo Möller 提交于
test was never triggered due to an off-by-one error. In s23_clnt.c, don't use special rollback-attack detection padding (RSA_SSLV23_PADDING) if SSL 2.0 is the only protocol enabled in the client; similarly, in s23_srvr.c, don't do the rollback check if SSL 2.0 is the only protocol enabled in the server.
-
- 22 2月, 2000 1 次提交
-
-
由 Ulf Möller 提交于
library, the output buffer always is large enough, but if the tlen parameter is there, it should be checked in the interest of clarity, as proposed by David Sacerdote <das33@cornell.edu>.
-
- 14 1月, 2000 1 次提交
-
-
由 Ulf Möller 提交于
returns int (1 = ok, 0 = not seeded). New function RAND_add() is the same as RAND_seed() but takes an estimate of the entropy as an additional argument.
-
- 24 4月, 1999 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Reviewed by: PR:
-
- 20 4月, 1999 1 次提交
-
-
由 Ulf Möller 提交于
-
- 21 12月, 1998 3 次提交
-
-
由 Ralf S. Engelschall 提交于
-
由 Ralf S. Engelschall 提交于
-
由 Ralf S. Engelschall 提交于
-