- 16 10月, 2001 2 次提交
-
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
case of ssl3_accept
-
- 10 10月, 2001 1 次提交
-
-
由 Richard Levitte 提交于
depend on the environment, like the presence of the OpenBSD crypto device or of Kerberos, do not change the dependencies within OpenSSL.
-
- 04 10月, 2001 2 次提交
-
-
由 Richard Levitte 提交于
Submitted by Massimo Santin <msantin@santineassociati.com>.
-
由 Richard Levitte 提交于
-
- 24 9月, 2001 2 次提交
-
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
- 21 9月, 2001 6 次提交
-
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
just sent a HelloRequest.
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
New option SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION.
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
reveal whether illegal block cipher padding was found or a MAC verification error occured. In ssl/s2_pkt.c, verify that the purported number of padding bytes is in the legal range.
-
- 14 9月, 2001 1 次提交
-
-
由 Bodo Möller 提交于
-
- 11 9月, 2001 1 次提交
-
-
由 Lutz Jänicke 提交于
settable (proposed by "Douglas E. Engert" <deengert@anl.gov>).
-
- 10 9月, 2001 1 次提交
-
-
由 Bodo Möller 提交于
CRYPTO_set_mem_debug_options() instead of CRYPTO_dbg_set_options(), which is the default implementation of the former and should usually not be directly used by applications (at least if we assume that the options accepted by the default implementation will also be meaningful to any other implementations). Also fix apps/openssl.c and ssl/ssltest such that environment variable setting 'OPENSSL_DEBUG_MEMORY=off' actively disables the compiled-in library defaults (i.e. such that CRYPTO_MDEBUG is ignored in this case).
-
- 03 9月, 2001 1 次提交
-
-
由 Bodo Möller 提交于
[DR]SA_up => [DR]SA_up_ref
-
- 02 9月, 2001 1 次提交
-
-
由 Geoff Thorpe 提交于
See the commit log message for that for more information. NB: X509_STORE_CTX's use of "ex_data" support was actually misimplemented (initialisation by "memset" won't/can't/doesn't work). This fixes that but requires that X509_STORE_CTX_init() be able to handle errors - so its prototype has been changed to return 'int' rather than 'void'. All uses of that function throughout the source code have been tracked down and adjusted.
-
- 29 8月, 2001 1 次提交
-
-
由 Geoff Thorpe 提交于
this construct, and Ulf provided the following insight as to why; > ANSI C compliant compilers must substitute "??)" for "]" because your > terminal might not have a "]" key if you bought it in the early 1970s. So we escape the final '?' to avoid this pathological case.
-
- 28 8月, 2001 1 次提交
-
-
由 Ben Laurie 提交于
-
- 26 8月, 2001 1 次提交
-
-
由 Geoff Thorpe 提交于
counts in DH, DSA, and RSA structures. Instead they use the new "***_up()" functions that handle this.
-
- 25 8月, 2001 1 次提交
-
-
由 Lutz Jänicke 提交于
-
- 24 8月, 2001 1 次提交
-
-
由 Lutz Jänicke 提交于
-
- 21 8月, 2001 1 次提交
-
-
由 Lutz Jänicke 提交于
-
- 20 8月, 2001 1 次提交
-
-
由 Lutz Jänicke 提交于
-
- 13 8月, 2001 1 次提交
-
-
由 Geoff Thorpe 提交于
setting stack (actually, array) values in ex_data. So only increment the global counters if the underlying CRYPTO_get_ex_new_index() call succeeds. This change doesn't make "ex_data" right (see the comment at the head of ex_data.c to know why), but at least makes the source code marginally less frustrating.
-
- 07 8月, 2001 2 次提交
-
-
由 Bodo Möller 提交于
ServerKeyExchange message may be skipped. Submitted by: Petr Lampa <lampa@fee.vutbr.cz>
-
由 Lutz Jänicke 提交于
-
- 06 8月, 2001 1 次提交
-
-
由 Ben Laurie 提交于
-
- 03 8月, 2001 1 次提交
-
-
由 Lutz Jänicke 提交于
-
- 01 8月, 2001 1 次提交
-
-
由 Lutz Jänicke 提交于
It did not work, it was deactivated by #if 0/#endif anyway _and_ we now have the working SSL_OP_CIPHER_SERVER_PREFERENCE.
-
- 31 7月, 2001 8 次提交
-
-
由 Lutz Jänicke 提交于
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
and rename some local variables to avoid name shadowing.
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
His comments are: First, it corrects a problem introduced in the last patch where the kssl_map_enc() would intentionally return NULL for valid ENCTYPE values. This was done to prevent verification of the kerberos 5 authenticator from being performed when Derived Key ciphers were in use. Unfortunately, the authenticator verification routine was not the only place that function was used. And it caused core dumps. Second, it attempt to add to SSL_SESSION the Kerberos 5 Client Principal Name.
-
由 Richard Levitte 提交于
-
由 Ben Laurie 提交于
-
由 Ben Laurie 提交于
-
- 30 7月, 2001 1 次提交
-
-
由 Lutz Jänicke 提交于
-