- 04 1月, 2012 2 次提交
-
-
由 Dr. Stephen Henson 提交于
Reviewed by: steve Fix memory leaks.
-
由 Dr. Stephen Henson 提交于
-
- 01 1月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Reviewed by: steve Support for TLS/DTLS heartbeats.
-
- 07 12月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 25 11月, 2011 1 次提交
-
-
由 Bodo Möller 提交于
(Problem pointed out by Ben Murphy.) Submitted by: Adam Langley
-
- 16 11月, 2011 2 次提交
-
-
由 Ben Laurie 提交于
-
由 Ben Laurie 提交于
-
- 05 9月, 2011 1 次提交
-
-
由 Bodo Möller 提交于
-
- 01 6月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 31 5月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 25 5月, 2011 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 20 5月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Alexei Khlebnikov <alexei.khlebnikov@opera.com> Reviewed by: steve OOM checking. Leak in OOM fix. Fall-through comment. Duplicate code elimination.
-
- 12 5月, 2011 2 次提交
-
-
由 Dr. Stephen Henson 提交于
Make sure message is long enough for signature algorithms.
-
由 Dr. Stephen Henson 提交于
-
- 09 5月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
algorithms extension (including everything we support). Swicth to new signature format where needed and relax ECC restrictions. Not TLS v1.2 client certifcate support yet but client will handle case where a certificate is requested and we don't have one.
-
- 06 5月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
signature algorithms extension and correct signature format for server key exchange. All ciphersuites should now work on the server but no client support and no client certificate support yet.
-
- 13 3月, 2011 1 次提交
-
-
由 Ben Laurie 提交于
-
- 09 2月, 2011 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Neel Mehta, Adam Langley, Bodo Moeller
-
- 25 11月, 2010 2 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Jack Lloyd <lloyd@randombit.net>, "Mounir IDRASSI" <mounir.idrassi@idrix.net>, steve Reviewed by: steve As required by RFC4492 an absent supported points format by a server is not an error: it should be treated as equivalent to an extension only containing uncompressed.
-
由 Dr. Stephen Henson 提交于
-
- 18 11月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Don't assume a decode error if session tlsext_ecpointformatlist is not NULL: it can be legitimately set elsewhere.
-
- 16 11月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 06 9月, 2010 1 次提交
-
-
由 Ben Laurie 提交于
-
- 27 8月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de> Fix other cases not covered by original patch.
-
- 28 7月, 2010 1 次提交
-
-
由 Ben Laurie 提交于
-
- 12 6月, 2010 1 次提交
-
-
由 Ben Laurie 提交于
-
- 18 2月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
initial connection to unpatched servers. There are no additional security concerns in doing this as clients don't see renegotiation during an attack anyway.
-
- 08 1月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
1. Send SCSV is not renegotiating, never empty RI. 2. Send RI if renegotiating.
-
- 17 12月, 2009 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 14 12月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
RI. Reorganise RI checking code and handle some missing cases.
-
- 08 12月, 2009 2 次提交
-
-
由 Dr. Stephen Henson 提交于
work in SSLv3: initial handshake has no extensions but includes MCSV, if server indicates RI support then renegotiation handshakes include RI. NB: current MCSV value is bogus for testing only, will be updated when we have an official value. Change mismatch alerts to handshake_failure as required by spec. Also have some debugging fprintfs so we can clearly see what is going on if OPENSSL_RI_DEBUG is set.
-
由 Dr. Stephen Henson 提交于
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Add extension support to DTLS code mainly using existing implementation for TLS.
-
- 07 12月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 18 11月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 11 11月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 08 11月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
ticket to request a new session.
-
- 30 10月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 05 9月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Approved by: steve@openssl.org Fix DTLS cookie management bugs.
-