1. 25 10月, 2001 1 次提交
  2. 24 10月, 2001 3 次提交
  3. 23 10月, 2001 2 次提交
  4. 22 10月, 2001 1 次提交
  5. 21 10月, 2001 6 次提交
    • D
      · f1558bb4
      Dr. Stephen Henson 提交于
      Reject certificates with unhandled critical extensions.
      f1558bb4
    • D
      · 6ca48799
      Dr. Stephen Henson 提交于
      Stop spurious "unable to load config info" errors in req
      6ca48799
    • B
      Call msg_callback with correct length parameter if ssl3_write_bytes had to · cf3a5ceb
      Bodo Möller 提交于
      be called multiple times
      cf3a5ceb
    • B
      New functions SSL[_CTX]_set_msg_callback(). · a661b653
      Bodo Möller 提交于
      New macros SSL[_CTX]_set_msg_callback_arg().
      
      Message callback imlementation for SSL 3.0/TLS 1.0 (no SSL 2.0 yet).
      
      New '-msg' option for 'openssl s_client' and 'openssl s_server'
      that enable a message callback that displays all protocol messages.
      
      
      In ssl3_get_client_hello (ssl/s3_srvr.c), generate a fatal alert if
      client_version is smaller than the protocol version in use.
      Also change ssl23_get_client_hello (ssl/s23_srvr.c) to select TLS 1.0
      if the client demanded SSL 3.0 but only TLS 1.0 is enabled; then the
      client will at least see that alert.
      
      Fix SSL[_CTX]_ctrl prototype (void * instead of char * for generic
      pointer).
      
      Add/update some OpenSSL copyright notices.
      a661b653
    • D
      Typo. · 98e66549
      Dr. Stephen Henson 提交于
      98e66549
    • D
      Add missing EVP_CIPHER_CTX_{init,cleanup} · cecd2638
      Dr. Stephen Henson 提交于
      cecd2638
  6. 18 10月, 2001 3 次提交
  7. 17 10月, 2001 3 次提交
  8. 16 10月, 2001 10 次提交
  9. 14 10月, 2001 1 次提交
  10. 12 10月, 2001 2 次提交
    • L
      Update information as a partial response to the post · 56fa8e69
      Lutz Jänicke 提交于
        From: "Chris D. Peterson" <cpeterson@aventail.com>
        Subject: Implementation Issues with OpenSSL
        To: openssl-users@openssl.org
        Date: Wed, 22 Aug 2001 16:13:17 -0700
      The patch included in the original post may improve the internal session
      list handling (and is therefore worth a seperate investigation).
      No change to the list handling will however solve the problems of incorrect
      SSL_SESSION_free() calls. The session list is only one possible point of
      failure, dangling pointers would also occur for SSL object currently
      using the session. The correct solution is to only use SSL_SESSION_free()
      when applicable!
      56fa8e69
    • R
      In certain cases, no encoding has been set up for the b64 filter. In · 67d0738a
      Richard Levitte 提交于
      such cases, a flush should *not* attempt to finalise the encoding, as
      the EVP_ENCODE_CTX structure will only be filled with garbage.  For
      the same reason, do the same check when a wpending is performed.
      67d0738a
  11. 11 10月, 2001 2 次提交
  12. 10 10月, 2001 6 次提交