- 30 4月, 2008 3 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 26 4月, 2008 1 次提交
-
-
由 Dr. Stephen Henson 提交于
successful. Check be seeing if there is a cache hit.
-
- 25 4月, 2008 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 28 3月, 2008 1 次提交
-
-
由 Geoff Thorpe 提交于
to 'unsigned long' (ie. odd platforms/compilers), so a pointer-typed version was added but it required portable code to check *both* modes to determine equality. This commit maintains the availability of both thread ID types, but deprecates the type-specific accessor APIs that invoke the callbacks - instead a single type-independent API is used. This simplifies software that calls into this interface, and should also make it less error-prone - as forgetting to call and compare *both* thread ID accessors could have led to hard-to-debug/infrequent bugs (that might only affect certain platforms or thread implementations). As the CHANGES note says, there were corresponding deprecations and replacements in the thread-related functions for BN_BLINDING and ERR too.
-
- 23 3月, 2008 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 17 3月, 2008 1 次提交
-
-
由 Geoff Thorpe 提交于
OPENSSL_NO_DEPRECATED, etc. Steve, please double-check the CMS stuff...
-
- 13 3月, 2008 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Initial support for CMS. Add zlib compression BIO. Add AES key wrap implementation. Generalize S/MIME MIME code to support CMS and/or PKCS7.
-
- 06 1月, 2008 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 15 12月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 03 11月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 27 10月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 26 10月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
of handshake failure 2. Changes to x509_certificate_type function (crypto/x509/x509type.c) to make it recognize GOST certificates as EVP_PKT_SIGN|EVP_PKT_EXCH (required for s3_srvr to accept GOST client certificates). 3. Changes to EVP - adding of function EVP_PKEY_CTX_get0_peerkey - Make function EVP_PKEY_derive_set_peerkey work for context with ENCRYPT operation, because we use peerkey field in the context to pass non-ephemeral secret key to GOST encrypt operation. - added EVP_PKEY_CTRL_SET_IV control command. It is really GOST-specific, but it is used in SSL code, so it has to go in some header file, available during libssl compilation 4. Fix to HMAC to avoid call of OPENSSL_cleanse on undefined data 5. Include des.h if KSSL_DEBUG is defined into some libssl files, to make debugging output which depends on constants defined there, work and other KSSL_DEBUG output fixes 6. Declaration of real GOST ciphersuites, two authentication methods SSL_aGOST94 and SSL_aGOST2001 and one key exchange method SSL_kGOST 7. Implementation of these methods. 8. Support for sending unsolicited serverhello extension if GOST ciphersuite is selected. It is require for interoperability with CryptoPro CSP 3.0 and 3.6 and controlled by SSL_OP_CRYPTOPRO_TLSEXT_BUG constant. This constant is added to SSL_OP_ALL, because it does nothing, if non-GOST ciphersuite is selected, and all implementation of GOST include compatibility with CryptoPro. 9. Support for CertificateVerify message without length field. It is another CryptoPro bug, but support is made unconditional, because it does no harm for draft-conforming implementation. 10. In tls1_mac extra copy of stream mac context is no more done. When I've written currently commited code I haven't read EVP_DigestSignFinal manual carefully enough and haven't noticed that it does an internal digest ctx copying. This implementation was tested against 1. CryptoPro CSP 3.6 client and server 2. Cryptopro CSP 3.0 server
-
- 18 10月, 2007 3 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Andy Polyakov 提交于
PR: 1587
-
由 Dr. Stephen Henson 提交于
PR: 1591
-
- 17 10月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 14 10月, 2007 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 13 10月, 2007 2 次提交
-
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
- 10 10月, 2007 2 次提交
-
-
由 Andy Polyakov 提交于
Submitted by: Alex Lam
-
由 Andy Polyakov 提交于
Submitted by: Alex Lam
-
- 06 10月, 2007 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 04 10月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 01 10月, 2007 6 次提交
-
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
Until now it was xor between CBC residue and 1st block from last datagram, or in other words still predictable.
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
HelloVerifyRequest.
-
由 Andy Polyakov 提交于
-
- 29 9月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
no status is notified even if no server extensions are present.
-
- 27 9月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 23 9月, 2007 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Bodo Möller 提交于
(which are pointless, but still might occur)
-
- 21 9月, 2007 1 次提交
-
-
由 Bodo Möller 提交于
(draft-rescorla-tls-opaque-prf-input-00.txt), and do some cleanups and bugfixes on the way. In particular, this fixes the buffer bounds checks in ssl_add_clienthello_tlsext() and in ssl_add_serverhello_tlsext(). Note that the opaque PRF Input TLS extension is not compiled by default; see CHANGES.
-
- 20 9月, 2007 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 19 9月, 2007 3 次提交
-
-
由 Ben Laurie 提交于
-
由 Ben Laurie 提交于
-
由 Ben Laurie 提交于
-