- 28 9月, 2006 1 次提交
-
-
由 Richard Levitte 提交于
1) Certificate Message with no certs OpenSSL implementation sends the Certificate message during SSL handshake, however as per the specification, these have been omitted. -- RFC 2712 -- CertificateRequest, and the ServerKeyExchange shown in Figure 1 will be omitted since authentication and the establishment of a master secret will be done using the client's Kerberos credentials for the TLS server. The client's certificate will be omitted for the same reason. -- RFC 2712 -- 3) Pre-master secret Protocol version The pre-master secret generated by OpenSSL does not have the correct client version. RFC 2712 says, if the Kerberos option is selected, the pre-master secret structure is the same as that used in the RSA case. TLS specification defines pre-master secret as: struct { ProtocolVersion client_version; opaque random[46]; } PreMasterSecret; where client_version is the latest protocol version supported by the client The pre-master secret generated by OpenSSL does not have the correct client version. The implementation does not update the first 2 bytes of random secret for Kerberos Cipher suites. At the server-end, the client version from the pre-master secret is not validated. PR: 1336
-
- 26 9月, 2006 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 25 9月, 2006 1 次提交
-
-
由 Richard Levitte 提交于
-
- 24 9月, 2006 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Reviewed by: steve
-
- 23 9月, 2006 2 次提交
-
-
由 Dr. Stephen Henson 提交于
PR:1374
-
由 Dr. Stephen Henson 提交于
PR:1348
-
- 22 9月, 2006 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 21 9月, 2006 6 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
PR: 1383
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
loaded. Add new function X509_CRL_get0_by_serial() to lookup a revoked entry to avoid the need to access the structure directly. Add new X509_CRL_METHOD to allow common CRL operations (verify, lookup) to be redirected.
-
- 19 9月, 2006 5 次提交
-
-
由 Andy Polyakov 提交于
PR: 1390
-
由 Andy Polyakov 提交于
PR: 1382
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
- 18 9月, 2006 2 次提交
-
-
由 Bodo Möller 提交于
[Problem pointed out by Adam Young <adamy (at) acm.org>]
-
由 Dr. Stephen Henson 提交于
-
- 17 9月, 2006 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Very early version, doesn't do much yet, not even added to the build system.
-
- 15 9月, 2006 1 次提交
-
-
由 Dr. Stephen Henson 提交于
handling to support this.
-
- 13 9月, 2006 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 12 9月, 2006 1 次提交
-
-
由 Bodo Möller 提交于
-
- 11 9月, 2006 2 次提交
-
-
由 Dr. Stephen Henson 提交于
callbacks.
-
由 Bodo Möller 提交于
ciphersuite as well
-
- 10 9月, 2006 1 次提交
-
-
由 Dr. Stephen Henson 提交于
based on subject name. New thread safe functions to retrieve matching STACK from X509_STORE. Cache some IDP components.
-
- 08 9月, 2006 1 次提交
-
-
由 Bodo Möller 提交于
(m_len currently is 'unsigned int', not 'size_t') Submitted by: Gisle Vanem
-
- 06 9月, 2006 6 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Bodo Möller 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Bodo Möller 提交于
Colin Percival (this would have caused more problems than solved, and isn't really necessary anyway)
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
- 05 9月, 2006 1 次提交
-
-
由 Mark J. Cox 提交于
(CVE-2006-4339) Submitted by: Ben Laurie, Google Security Team Reviewed by: bmoeller, mjc, shenson
-
- 01 9月, 2006 4 次提交
-
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
PR: 1380
-
由 Dr. Stephen Henson 提交于
-