- 03 12月, 2014 1 次提交
-
-
由 Matt Caswell 提交于
used with no explanation. Some of this was introduced as part of RT#1929. The value 28 is the length of the IP header (20 bytes) plus the UDP header (8 bytes). However use of this constant is incorrect because there may be instances where a different value is needed, e.g. an IPv4 header is 20 bytes but an IPv6 header is 40. Similarly you may not be using UDP (e.g. SCTP). This commit introduces a new BIO_CTRL that provides the value to be used for this mtu "overhead". It will be used by subsequent commits. Reviewed-by: NTim Hudson <tjh@openssl.org>
-
- 17 11月, 2014 1 次提交
-
-
由 Jan Hykel 提交于
Don't attempt to access msg structure if recvmsg returns an error. PR#3483 Reviewed-by: NStephen Henson <steve@openssl.org> Reviewed-by: NTim Hudson <tjh@openssl.org>
-
- 29 8月, 2014 1 次提交
-
-
由 l.montecchiani@gmail.com 提交于
Problem with #ifdef in the BIO_CTRL_DGRAM_MTU_DISCOVER case that is different from the BIO_CTRL_DGRAM_QUERY_MTU one which seems correct. Reviewed-by: NMatt Caswell <matt@openssl.org>
-
- 16 8月, 2014 1 次提交
-
-
由 Jonas Maebe 提交于
Signed-off-by: NKurt Roeckx <kurt@openssl.org> Reviewed-by: NRich Salz <rsalz@openssl.org>
-
- 09 8月, 2014 2 次提交
- 12 5月, 2014 2 次提交
-
-
由 Kurt Roeckx 提交于
-
由 Martin Brejcha 提交于
PR: 3327
-
- 06 3月, 2014 1 次提交
-
-
由 Andy Polyakov 提交于
Submitted by: Roumen Petrov
-
- 02 11月, 2013 1 次提交
-
-
由 Robin Seggelmann 提交于
PR: 2809 DTLS/SCTP requires DATA and FORWARD-TSN chunks to be protected with SCTP-AUTH. It is checked if this has been activated successfully for the local and remote peer. Due to a bug, however, the gauth_number_of_chunks field of the authchunks struct is missing on FreeBSD, and was therefore not considered in the OpenSSL implementation. This patch sets the corresponding pointer for the check correctly whether or not this bug is present. (cherry picked from commit f596e3c491035fe80db5fc0c3ff6b647662b0003)
-
- 20 1月, 2013 1 次提交
-
-
由 Andy Polyakov 提交于
Submitted by: Pierre Delaage
-
- 17 12月, 2012 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 14 8月, 2012 1 次提交
-
-
由 Andy Polyakov 提交于
contemporary SDK.
-
- 01 7月, 2012 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 11 6月, 2012 2 次提交
-
-
由 Andy Polyakov 提交于
PR: 2830 Submitted by: Robin Seggelmann
-
由 Andy Polyakov 提交于
-
- 30 5月, 2012 1 次提交
-
-
由 Ben Laurie 提交于
-
- 06 3月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Reduce MTU after failed transmissions.
-
- 27 12月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 25 12月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Reviewed by: steve Add SCTP support for DTLS (RFC 6083).
-
- 01 9月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: "Mauro H. Leggieri" <mxmauro@caiman.com.ar> Reviewed by: steve Stop warnings if OPENSSL_NO_DGRAM is defined.
-
- 20 7月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Reviewed by: steve Fix DTLS socket error bug
-
- 03 1月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Michael Bergandi <mbergandi@gmail.com> Reviewed by: steve Fix typo in crypto/bio/bss_dgram.c
-
- 07 1月, 2010 2 次提交
-
-
由 Andy Polyakov 提交于
PR: 2114 Submitted by: Robin Seggelmann
-
由 Andy Polyakov 提交于
not to mention that first sockaddr_storage had __ss_family, not ss_family. In other words it makes more sense to avoid sockaddr_storage...
-
- 27 11月, 2009 1 次提交
-
-
由 Andy Polyakov 提交于
PR: 2110
-
- 16 11月, 2009 1 次提交
-
-
由 Andy Polyakov 提交于
from b_sock.c, don't assume that caller always passes pointer to buffer large enough to hold sockaddr_storage. PR: 2069
-
- 16 10月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Michael Tuexen <tuexen@fh-muenster.de> Approved by: steve@openssl.org IPv6 support for DTLS.
-
- 22 9月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Michael Tuexen <tuexen@fh-muenster.de> Approved by: steve@openssl.org Fix handling of ENOTCONN and EMSGSIZE for dgram BIOs.
-
- 05 9月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Approved by: steve@openssl.org Fix DTLS cookie management bugs.
-
- 26 8月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: steve@openssl.org Some systems have broken IPv6 headers and/or implementations. If OPENSSL_USE_IPV6 is set to 0 IPv6 is not used, if it is set to 1 it is used and if undefined an attempt is made to detect at compile time by checking if AF_INET6 is set and excluding known problem platforms.
-
- 24 7月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Update from 0.9.8-stable
-
- 05 6月, 2009 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 19 5月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 18 5月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 16 5月, 2009 3 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Approved by: steve@openssl.org DTLS MTU bug.
-
由 Dr. Stephen Henson 提交于
-
- 05 5月, 2009 1 次提交
-
-
由 Richard Levitte 提交于
make sure that BOTH instances of said code get the VMS modification.
-