1. 04 12月, 2017 3 次提交
  2. 13 11月, 2017 1 次提交
  3. 30 10月, 2017 2 次提交
  4. 18 10月, 2017 1 次提交
  5. 09 10月, 2017 1 次提交
  6. 23 9月, 2017 1 次提交
  7. 01 9月, 2017 1 次提交
  8. 03 8月, 2017 1 次提交
  9. 01 8月, 2017 1 次提交
  10. 13 7月, 2017 2 次提交
  11. 03 7月, 2017 1 次提交
  12. 24 6月, 2017 1 次提交
  13. 21 6月, 2017 4 次提交
  14. 20 6月, 2017 1 次提交
  15. 10 6月, 2017 1 次提交
  16. 07 6月, 2017 1 次提交
  17. 23 5月, 2017 1 次提交
  18. 22 5月, 2017 2 次提交
  19. 19 5月, 2017 1 次提交
    • M
      Try to be more consistent about the alerts we send · fb34a0f4
      Matt Caswell 提交于
      We are quite inconsistent about which alerts get sent. Specifically, these
      alerts should be used (normally) in the following circumstances:
      
      SSL_AD_DECODE_ERROR = The peer sent a syntactically incorrect message
      SSL_AD_ILLEGAL_PARAMETER = The peer sent a message which was syntactically
      correct, but a parameter given is invalid for the context
      SSL_AD_HANDSHAKE_FAILURE = The peer's messages were syntactically and
      semantically correct, but the parameters provided were unacceptable to us
      (e.g. because we do not support the requested parameters)
      SSL_AD_INTERNAL_ERROR = We messed up (e.g. malloc failure)
      
      The standards themselves aren't always consistent but I think the above
      represents the best interpretation.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/3480)
      fb34a0f4
  20. 17 5月, 2017 1 次提交
  21. 12 5月, 2017 1 次提交
  22. 11 5月, 2017 3 次提交
  23. 08 5月, 2017 1 次提交
  24. 26 4月, 2017 1 次提交
  25. 25 4月, 2017 1 次提交
  26. 07 4月, 2017 1 次提交
  27. 04 4月, 2017 2 次提交
  28. 29 3月, 2017 2 次提交