- 01 3月, 2010 4 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 28 2月, 2010 4 次提交
-
-
由 Ben Laurie 提交于
warnings hard to fix without major surgery).
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
1.0.0. Original fix was on 2007-Mar-09 and had the log message: "Fix kerberos ciphersuite bugs introduced with PR:1336."
-
- 27 2月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 26 2月, 2010 4 次提交
-
-
由 Dr. Stephen Henson 提交于
CFB mode does *not* have to be a multiple of the block length and several other specifications (e.g. PKCS#11) do not require this.
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 25 2月, 2010 6 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
certificate is explicitly trusted (using -addtrust option to x509 utility for example) the verification is sucessful even if the chain is not complete.
-
由 Dr. Stephen Henson 提交于
allow setting of verify names in command line utilities and print out verify names in verify utility
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
as issuer and subject names. Although this is an incompatible change it should have little impact in pratice because self-issued certificates that are not self-signed are rarely encountered.
-
- 24 2月, 2010 5 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
- 23 2月, 2010 2 次提交
-
-
由 Dr. Stephen Henson 提交于
X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT error codes were reversed in the verify application documentation.
-
由 Bodo Möller 提交于
(The CHANGES entry covers the change from PR #2111 as well, submitted by Martin Olsson.) Submitted by: Neel Mehta
-
- 20 2月, 2010 1 次提交
-
-
由 Bodo Möller 提交于
-
- 18 2月, 2010 3 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
initial connection to unpatched servers. There are no additional security concerns in doing this as clients don't see renegotiation during an attack anyway.
-
- 17 2月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: James Baker <jbaker@tableausoftware.com> et al. Workaround for slow Heap32Next on some versions of Windows.
-
- 16 2月, 2010 6 次提交
-
-
由 Dr. Stephen Henson 提交于
Don't leave dangling pointers in GOST engine if calls fail.
-
由 Dr. Stephen Henson 提交于
Submitted by: Tomas Mraz <tmraz@redhat.com> Since SSLv2 doesn't support renegotiation at all don't reject it if legacy renegotiation isn't enabled. Also can now use SSL2 compatible client hello because RFC5746 supports it.
-
由 Dr. Stephen Henson 提交于
should be the number of feedback bits expressed in bytes. For CFB1 mode set this to 1 by rounding up to the nearest multiple of 8.
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
Submitted by: "Noszticzius, Istvan" <inoszticzius@rightnow.com> Don't clear the output buffer: ciphers should correctly the same input and output buffers.
-
- 13 2月, 2010 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
Submitted by: Magnus Lilja <lilja.magnus@gmail.com> Make -c option in dgst work again.
-
- 09 2月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-