- 01 9月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Reviewed by: steve Fix DTLS buffering and decryption bug.
-
- 24 8月, 2011 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 14 8月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
using OBJ xref utilities instead of string comparison with OID name. This removes the arbitrary restriction on using SHA1 only with some ECC ciphersuites.
-
- 03 8月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
invocation field. Add complete support for AES GCM ciphersuites including all those in RFC5288 and RFC5289.
-
- 26 7月, 2011 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
prohibit use of these ciphersuites for TLS < 1.2
-
- 20 7月, 2011 2 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Reviewed by: steve Fix DTLS sequence number bug
-
由 Dr. Stephen Henson 提交于
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Reviewed by: steve Fix DTLS HelloVerifyRequest Timer bug
-
- 11 7月, 2011 2 次提交
-
-
由 Andy Polyakov 提交于
combos that can be implemented as AEAD ciphers.
-
由 Andy Polyakov 提交于
-
- 22 6月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Reviewed by: steve Correctly handle errors in DTLSv1_handle_timeout()
-
- 14 6月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 08 6月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 06 6月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 04 6月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 01 6月, 2011 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 31 5月, 2011 2 次提交
-
-
由 Dr. Stephen Henson 提交于
digest in use: this caused the PRF to fail for an odd premaster secret length.
-
由 Dr. Stephen Henson 提交于
-
- 25 5月, 2011 8 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Reviewed by: steve Setting SSL_MODE_RELEASE_BUFFERS should be ignored for DTLS, but instead causes the program to crash. This is due to missing version checks and is fixed with this patch.
-
由 Dr. Stephen Henson 提交于
Submitted by: Marcus Meissner <meissner@suse.de> Reviewed by: steve Call ssl_new() to reallocate SSL BIO internals if we want to replace the existing internal SSL structure.
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Reviewed by: steve Fully implement SSL_clear for DTLS.
-
由 Dr. Stephen Henson 提交于
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Reviewed by: steve Fix DTLS session resumption timer bug.
-
由 Dr. Stephen Henson 提交于
-
- 20 5月, 2011 3 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Alexei Khlebnikov <alexei.khlebnikov@opera.com> Reviewed by: steve OOM checking. Leak in OOM fix. Fall-through comment. Duplicate code elimination.
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 13 5月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Parse certificate request message and set digests appropriately. Generate new TLS v1.2 format certificate verify message. Keep handshake caches around for longer as they are needed for client auth.
-
- 12 5月, 2011 3 次提交
-
-
由 Dr. Stephen Henson 提交于
Make sure message is long enough for signature algorithms.
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 09 5月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
algorithms extension (including everything we support). Swicth to new signature format where needed and relax ECC restrictions. Not TLS v1.2 client certifcate support yet but client will handle case where a certificate is requested and we don't have one.
-
- 06 5月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
signature algorithms extension and correct signature format for server key exchange. All ciphersuites should now work on the server but no client support and no client certificate support yet.
-
- 01 5月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 30 4月, 2011 2 次提交
-
-
由 Dr. Stephen Henson 提交于
checking added, SHA256 PRF support added. At present only RSA key exchange ciphersuites work with TLS v1.2 as the new signature format is not yet implemented.
-
由 Dr. Stephen Henson 提交于
OPENSSL_NO_SSL_INTERN all ssl related structures are opaque and internals cannot be directly accessed. Many applications will need some modification to support this and most likely some additional functions added to OpenSSL. The advantage of this option is that any application supporting it will still be binary compatible if SSL structures change.
-
- 11 4月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-