- 03 8月, 2001 5 次提交
-
-
由 Lutz Jänicke 提交于
-
由 Ben Laurie 提交于
-
由 Richard Levitte 提交于
-
由 Bodo Möller 提交于
-
由 Lutz Jänicke 提交于
-
- 01 8月, 2001 4 次提交
-
-
由 Lutz Jänicke 提交于
-
由 Lutz Jänicke 提交于
It did not work, it was deactivated by #if 0/#endif anyway _and_ we now have the working SSL_OP_CIPHER_SERVER_PREFERENCE.
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
the norm for 'gcc -M' but not for 'makedepend', and is merely introduced here to avoid commit wars.
-
- 31 7月, 2001 16 次提交
-
-
由 Lutz Jänicke 提交于
-
由 Ben Laurie 提交于
-
由 Ben Laurie 提交于
-
由 Lutz Jänicke 提交于
-
由 Richard Levitte 提交于
(Latin for "comments", anyone?)
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
and rename some local variables to avoid name shadowing.
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
His comments are: First, it corrects a problem introduced in the last patch where the kssl_map_enc() would intentionally return NULL for valid ENCTYPE values. This was done to prevent verification of the kerberos 5 authenticator from being performed when Derived Key ciphers were in use. Unfortunately, the authenticator verification routine was not the only place that function was used. And it caused core dumps. Second, it attempt to add to SSL_SESSION the Kerberos 5 Client Principal Name.
-
由 Ben Laurie 提交于
-
由 Richard Levitte 提交于
-
由 Ben Laurie 提交于
-
由 Ben Laurie 提交于
DES's keyschedules. I know these two should be separate, and I'll back out the DES changes if they are deemed to be an error. Note that there is a memory leak lurking in SSL somewhere in this version.
-
由 Ben Laurie 提交于
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
HP-UX in common in ./config). Note that for the moment of this writing none of 64-bit platforms pass bntest. I'm committing this anyway as it's too frustrating to patch snapshots over and over while 0.9.6 is known to work.
-
- 30 7月, 2001 6 次提交
-
-
由 Andy Polyakov 提交于
-
由 Ben Laurie 提交于
-
由 Andy Polyakov 提交于
-
由 Lutz Jänicke 提交于
-
由 Lutz Jänicke 提交于
-
由 Lutz Jänicke 提交于
-
- 28 7月, 2001 2 次提交
-
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
- 27 7月, 2001 5 次提交
-
-
由 Lutz Jänicke 提交于
circumstances.
-
由 Richard Levitte 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
More linker bloat reorganisation: Split private key PEM and normal PEM handling. Private key handling needs to link in stuff like PKCS#8. Relocate the ASN1 *_dup() functions, to the relevant ASN1 modules using new macro IMPLEMENT_ASN1_DUP_FUNCTION. Previously these were all in crypto/x509/x_all.c along with every ASN1 BIO/fp function which linked in *every* ASN1 function if a single dup was used. Move the authority key id ASN1 structure to a separate file. This is used in the X509 routines and its previous location linked in all the v3 extension code. Also move ASN1_tag2bit to avoid linking in a_bytes.c which is now largely obsolete. So far under Linux stripped binary with single PEM_read_X509 is now 238K compared to 380K before these changes.
-
由 Dr. Stephen Henson 提交于
First of several reorganisations to reduce linker bloat. For example the single line: PEM_read_X509() results in a binary of around 400K in Linux! This first step separates some of the PEM functions and avoids linking in some PKCS#7 and PKCS#12 code.
-
- 26 7月, 2001 2 次提交
-
-
由 Lutz Jänicke 提交于
-
由 Bodo Möller 提交于
or bogus DH parameters can be used for launching DOS attacks
-