- 28 9月, 2006 1 次提交
-
-
由 Richard Levitte 提交于
1) Certificate Message with no certs OpenSSL implementation sends the Certificate message during SSL handshake, however as per the specification, these have been omitted. -- RFC 2712 -- CertificateRequest, and the ServerKeyExchange shown in Figure 1 will be omitted since authentication and the establishment of a master secret will be done using the client's Kerberos credentials for the TLS server. The client's certificate will be omitted for the same reason. -- RFC 2712 -- 3) Pre-master secret Protocol version The pre-master secret generated by OpenSSL does not have the correct client version. RFC 2712 says, if the Kerberos option is selected, the pre-master secret structure is the same as that used in the RSA case. TLS specification defines pre-master secret as: struct { ProtocolVersion client_version; opaque random[46]; } PreMasterSecret; where client_version is the latest protocol version supported by the client The pre-master secret generated by OpenSSL does not have the correct client version. The implementation does not update the first 2 bytes of random secret for Kerberos Cipher suites. At the server-end, the client version from the pre-master secret is not validated. PR: 1336
-
- 16 6月, 2006 1 次提交
-
-
由 Bodo Möller 提交于
Also, change the default ciphersuite to give some prefererence to ciphersuites with forwared secrecy (rather than using a random order).
-
- 15 6月, 2006 1 次提交
-
-
由 Bodo Möller 提交于
-
- 30 3月, 2006 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Douglas Stebila
-
- 12 3月, 2006 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Douglas Stebila
-
- 11 3月, 2006 1 次提交
-
-
由 Nils Larsch 提交于
PR: 1191 Submitted by: Mika Kousa and Pasi Eronen of Nokia Corporation Reviewed by: Nils Larsch
-
- 13 1月, 2006 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Peter Sylvester
-
- 11 1月, 2006 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Peter Sylvester
-
- 03 1月, 2006 2 次提交
-
-
由 Bodo Möller 提交于
- fix indentation - rename some functions and macros - fix up confusion between SSL_ERROR_... and SSL_AD_... values
-
由 Bodo Möller 提交于
Submitted by: Peter Sylvester
-
- 13 12月, 2005 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Douglas Stebila
-
- 06 12月, 2005 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 08 10月, 2005 1 次提交
-
-
由 Dr. Stephen Henson 提交于
maximum send fragment size. Allocate I/O buffers accordingly.
-
- 01 10月, 2005 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 15 8月, 2005 1 次提交
-
-
由 Nils Larsch 提交于
pointer and make the SSL_METHOD parameter in SSL_CTX_new, SSL_CTX_set_ssl_version and SSL_set_ssl_method const.
-
- 06 8月, 2005 1 次提交
-
-
由 Dr. Stephen Henson 提交于
for locking code. The CRYPTO_LOCK_SSL_METHOD lock is now no longer used.
-
- 16 7月, 2005 1 次提交
-
-
由 Nils Larsch 提交于
./configure no-deprecated [no-dsa] [no-dh] [no-ec] [no-rsa] make depend all test work again PR: 1159
-
- 16 5月, 2005 1 次提交
-
-
由 Nils Larsch 提交于
- hide the EC_KEY structure definition in ec_lcl.c + add some functions to use/access the EC_KEY fields - change the way how method specific data (ecdsa/ecdh) is attached to a EC_KEY - add ECDSA_sign_ex and ECDSA_do_sign_ex functions with additional parameters for pre-computed values - rebuild libeay.num from 0.9.7
-
- 12 5月, 2005 1 次提交
-
-
由 Bodo Möller 提交于
with the SSL_OP_NO_SSLv2 option.
-
- 10 5月, 2005 1 次提交
-
-
由 Nils Larsch 提交于
EC_GROUP_new_by_nid -> EC_GROUP_new_by_curve_name
-
- 30 4月, 2005 1 次提交
-
-
由 Nils Larsch 提交于
-
- 27 4月, 2005 2 次提交
-
-
由 Bodo Möller 提交于
("perl util/ck_errf.pl */*.c */*/*.c" still reports many more.)
-
由 Ben Laurie 提交于
-
- 23 4月, 2005 1 次提交
-
-
由 Nils Larsch 提交于
-
- 22 3月, 2005 1 次提交
-
-
由 Dr. Stephen Henson 提交于
client random values.
-
- 18 5月, 2004 1 次提交
-
-
由 Geoff Thorpe 提交于
remove some unnecessary includes from the internal header ssl_locl.h. This then requires adding includes for bn.h in four C files.
-
- 20 4月, 2004 1 次提交
-
-
由 Geoff Thorpe 提交于
tree. This further reduces header interdependencies, and makes some associated cleanups.
-
- 16 3月, 2004 1 次提交
-
-
由 Richard Levitte 提交于
functions and macros. This change has associated tags: LEVITTE_before_const and LEVITTE_after_const. Those will be removed when this change has been properly reviewed.
-
- 28 12月, 2003 1 次提交
-
-
由 Richard Levitte 提交于
Check if IDEA is being built or not. This is part of a large change submitted by Markus Friedl <markus@openbsd.org>
-
- 29 11月, 2003 1 次提交
-
-
由 Richard Levitte 提交于
compared it to the amount of bits required... PR: 770 Submitted by: c zhang <czhang2005@hotmail.com>
-
- 30 10月, 2003 1 次提交
-
-
由 Geoff Thorpe 提交于
I have tried to convert 'len' type variable declarations to unsigned as a means to address these warnings when appropriate, but when in doubt I have used casts in the comparisons instead. The better solution (that would get us all lynched by API users) would be to go through and convert all the function prototypes and structure definitions to use unsigned variables except when signed is necessary. The proliferation of (signed) "int" for strictly non-negative uses is unfortunate.
-
- 28 9月, 2003 1 次提交
-
-
由 Richard Levitte 提交于
PR: 679
-
- 22 7月, 2003 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Douglas Stebila Reviewed by: Bodo Moeller
-
- 28 2月, 2003 2 次提交
-
-
由 Bodo Möller 提交于
- bugfix: in ECDH_compute_key, pad x coordinate with leading zeros if necessary
-
由 Bodo Möller 提交于
-
- 22 12月, 2002 1 次提交
-
-
由 Richard Levitte 提交于
(I wonder why s2_connect() handles the initial buffer allocation slightly differently...) PR: 416
-
- 28 11月, 2002 1 次提交
-
-
由 Richard Levitte 提交于
I've covered all the memset()s I felt safe modifying, but may have missed some.
-
- 20 11月, 2002 1 次提交
-
-
由 Lutz Jänicke 提交于
caching (#288): now internal caching failed (#351): Make sure, that cipher_id is set before comparing. Submitted by: Reviewed by: PR: 288 (and 351)
-
- 15 11月, 2002 1 次提交
-
-
由 Lutz Jänicke 提交于
from external cache (using d2i_SSL_SESSION). Perform comparison based on the cipher's id instead. Submitted by: Steve Haslam <araqnid@innocent.com> Reviewed by: PR: 288
-
- 13 11月, 2002 1 次提交
-
-
由 Ben Laurie 提交于
-