- 11 2月, 2012 2 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Tomas Mraz <tmraz@redhat.com> Make no-srp work.
-
由 Dr. Stephen Henson 提交于
-
- 09 2月, 2012 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
some servers.
-
- 22 1月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 19 1月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Thanks to Antonio Martin, Enterprise Secure Access Research and Development, Cisco Systems, Inc. for discovering this bug and preparing a fix. (CVE-2012-0050)
-
- 13 1月, 2012 1 次提交
-
-
由 Andy Polyakov 提交于
are passed zero-extended, not sign-extended. PR: 2682
-
- 12 1月, 2012 1 次提交
-
-
由 Andy Polyakov 提交于
PR: 2681 Submitted by: Annie Yousar
-
- 05 1月, 2012 1 次提交
-
-
由 Bodo Möller 提交于
-
- 01 1月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Reviewed by: steve Support for TLS/DTLS heartbeats.
-
- 27 12月, 2011 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr> Reviewed by: steve - remove some unncessary SSL_err and permit an srp user callback to allow a worker to obtain a user verifier. - cleanup and comments in s_server and demonstration for asynchronous srp user lookup
-
- 22 12月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
New function to retrieve compression method from SSL_SESSION structure. Delete SSL_SESSION_get_id_len and SSL_SESSION_get0_id functions as they duplicate functionality of SSL_SESSION_get_id. Note: these functions have never appeared in any release version of OpenSSL.
-
- 19 12月, 2011 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 16 12月, 2011 1 次提交
-
-
由 Andy Polyakov 提交于
PR: 2655
-
- 15 12月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr> Reviewed by: steve Remove unnecessary code for srp and to add some comments to s_client. - the callback to provide a user during client connect is no longer necessary since rfc 5054 a connection attempt with an srp cipher and no user is terminated when the cipher is acceptable - comments to indicate in s_client the (non-)usefulness of th primalaty tests for non known group parameters.
-
- 13 12月, 2011 2 次提交
-
-
由 Ben Laurie 提交于
-
由 Ben Laurie 提交于
-
- 10 12月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 08 12月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 07 12月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 06 12月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
be the server FQDN: change it. [Reported by PSW Group]
-
- 16 11月, 2011 2 次提交
-
-
由 Ben Laurie 提交于
-
由 Ben Laurie 提交于
-
- 14 11月, 2011 1 次提交
-
-
由 Ben Laurie 提交于
aspirational __owur annotations.
-
- 13 11月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Peter Sylvester <peter.sylvester@edelweb.fr> Reviewed by: steve Document unknown_psk_identify alert, remove pre-RFC 5054 string from ssl_stat.c
-
- 10 10月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 07 10月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
key to the one in a request. This is useful for cases where the public key cannot be used for signing e.g. DH.
-
- 24 9月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 23 9月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Tomas Mraz <tmraz@redhat.com> Reviewed by: steve Fix usage message.
-
- 25 5月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Marcus Meissner <meissner@suse.de> Reviewed by: steve Set cnf to NULL to avoid possible double free.
-
- 20 5月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 13 5月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
FIPS_mode_set is implemented.
-
- 12 5月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 09 5月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
algorithms extension (including everything we support). Swicth to new signature format where needed and relax ECC restrictions. Not TLS v1.2 client certifcate support yet but client will handle case where a certificate is requested and we don't have one.
-
- 06 5月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
signature algorithms extension and correct signature format for server key exchange. All ciphersuites should now work on the server but no client support and no client certificate support yet.
-
- 30 4月, 2011 2 次提交
-
-
由 Dr. Stephen Henson 提交于
checking added, SHA256 PRF support added. At present only RSA key exchange ciphersuites work with TLS v1.2 as the new signature format is not yet implemented.
-
由 Dr. Stephen Henson 提交于
OPENSSL_NO_SSL_INTERN all ssl related structures are opaque and internals cannot be directly accessed. Many applications will need some modification to support this and most likely some additional functions added to OpenSSL. The advantage of this option is that any application supporting it will still be binary compatible if SSL structures change.
-
- 24 4月, 2011 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-