- 12 5月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Make sure message is long enough for signature algorithms.
-
- 09 5月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
algorithms extension (including everything we support). Swicth to new signature format where needed and relax ECC restrictions. Not TLS v1.2 client certifcate support yet but client will handle case where a certificate is requested and we don't have one.
-
- 06 5月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
signature algorithms extension and correct signature format for server key exchange. All ciphersuites should now work on the server but no client support and no client certificate support yet.
-
- 30 4月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
checking added, SHA256 PRF support added. At present only RSA key exchange ciphersuites work with TLS v1.2 as the new signature format is not yet implemented.
-
- 13 3月, 2011 1 次提交
-
-
由 Ben Laurie 提交于
-
- 06 9月, 2010 1 次提交
-
-
由 Ben Laurie 提交于
-
- 28 7月, 2010 1 次提交
-
-
由 Ben Laurie 提交于
-
- 08 12月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Add extension support to DTLS code mainly using existing implementation for TLS.
-
- 07 12月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 02 12月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Approved by: steve@openssl.org Add Renegotiation extension to DTLS, fix DTLS ClientHello processing bug.
-
- 10 11月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 12 8月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Approved by: steve@openssl.org DTLS timeout handling fix.
-
- 16 5月, 2009 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 15 4月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 08 4月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 05 1月, 2009 1 次提交
-
-
由 Lutz Jänicke 提交于
Some #include statements were not properly protected. This will go unnoted on most systems as openssl/comp.h tends to be installed as a system header file by default but may become visible when cross compiling.
-
- 30 12月, 2008 1 次提交
-
-
由 Ben Laurie 提交于
test for them!
-
- 27 12月, 2008 1 次提交
-
-
由 Ben Laurie 提交于
-
- 22 10月, 2008 1 次提交
-
-
由 Dr. Stephen Henson 提交于
with the appropriate parameters which calls OBJ_bsearch(). A compiler will typically inline this. This avoids the need for cmp_xxx variables and fixes unchecked const issues with CHECKED_PTR_OF()
-
- 20 10月, 2008 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Duplicate const. Use of ; outside function.
-
- 12 10月, 2008 1 次提交
-
-
由 Ben Laurie 提交于
-
- 15 9月, 2008 1 次提交
-
-
由 Bodo Möller 提交于
-
- 11 9月, 2008 1 次提交
-
-
由 Dr. Stephen Henson 提交于
strength "FIPS" to represent all FIPS approved ciphersuites without NULL encryption.
-
- 05 8月, 2008 1 次提交
-
-
由 Bodo Möller 提交于
Also, get rid of compile-time switch OPENSSL_NO_RELEASE_BUFFERS because it was rather pointless (the new behavior has to be explicitly requested by setting SSL_MODE_RELEASE_BUFFERS anyway).
-
- 03 6月, 2008 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Ben Laurie 提交于
-
- 02 6月, 2008 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 06 10月, 2007 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 27 9月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 21 9月, 2007 1 次提交
-
-
由 Bodo Möller 提交于
(draft-rescorla-tls-opaque-prf-input-00.txt), and do some cleanups and bugfixes on the way. In particular, this fixes the buffer bounds checks in ssl_add_clienthello_tlsext() and in ssl_add_serverhello_tlsext(). Note that the opaque PRF Input TLS extension is not compiled by default; see CHANGES.
-
- 31 8月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Victor B. Wagner <vitus@cryptocom.ru>
-
- 20 8月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 13 8月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 12 8月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
for OpenSSL.
-
- 05 6月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 24 4月, 2007 1 次提交
-
-
由 Bodo Möller 提交于
PR: 1503 Submitted by: KISA Reviewed by: Bodo Moeller
-
- 24 3月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: ran@cryptocom.ru Reviewed by: steve@openssl.org
-
- 17 2月, 2007 1 次提交
-
-
由 Bodo Möller 提交于
This change resolves a number of problems and obviates multiple kludges. A new feature is that you can now say "AES256" or "AES128" (not just "AES", which enables both). In some cases the ciphersuite list generated from a given string is affected by this change. I hope this is just in those cases where the previous behaviour did not make sense.
-
- 16 6月, 2006 1 次提交
-
-
由 Bodo Möller 提交于
Also, change the default ciphersuite to give some prefererence to ciphersuites with forwared secrecy (rather than using a random order).
-