1. 24 4月, 1999 1 次提交
  2. 23 4月, 1999 1 次提交
  3. 22 4月, 1999 1 次提交
  4. 20 4月, 1999 1 次提交
  5. 18 4月, 1999 1 次提交
  6. 16 4月, 1999 1 次提交
  7. 13 4月, 1999 1 次提交
  8. 22 3月, 1999 1 次提交
  9. 06 3月, 1999 2 次提交
  10. 25 2月, 1999 2 次提交
    • R
      Add a bunch of SSL_xxx() functions for configuring the temporary RSA and DH · 15d21c2d
      Ralf S. Engelschall 提交于
      private keys and/or callback functions which directly correspond to their
      SSL_CTX_xxx() counterparts but work on a per-connection basis. This is needed
      for applications which have to configure certificates on a per-connection
      basis (e.g. Apache+mod_ssl) instead of a per-context basis (e.g.
      s_server).
      
      For the RSA certificate situation is makes no difference, but for the DSA
      certificate situation this fixes the "no shared cipher" problem where the
      OpenSSL cipher selection procedure failed because the temporary keys were not
      overtaken from the context and the API provided no way to reconfigure them.
      
      The new functions now let applications reconfigure the stuff and they are in
      detail: SSL_need_tmp_RSA, SSL_set_tmp_rsa, SSL_set_tmp_dh,
      SSL_set_tmp_rsa_callback and SSL_set_tmp_dh_callback.  Additionally a new
      non-public-API function ssl_cert_instantiate() is used as a helper function
      and also to reduce code redundancy inside ssl_rsa.c.
      
      Submitted by: Ralf S. Engelschall
      Reviewed by: Ben Laurie
      15d21c2d
    • R
      Fix the cipher decision scheme for export ciphers: the export bits are *not* · 90a52cec
      Ralf S. Engelschall 提交于
      within SSL_MKEY_MASK or SSL_AUTH_MASK, they are within SSL_EXP_MASK.  So, the
      original variable has to be used instead of the already masked variable.
      
      Submitted by: Richard Levitte <levitte@stacken.kth.se>
      Reviewed by: Ralf S. Engelschall
      90a52cec
  11. 22 2月, 1999 4 次提交
  12. 16 2月, 1999 1 次提交
    • M
      Updates to the new SSL compression code · 413c4f45
      Mark J. Cox 提交于
           [Eric A. Young, (from changes to C2Net SSLeay, integrated by Mark Cox)]
      
      Fix so that the version number in the master secret, when passed
           via RSA, checks that if TLS was proposed, but we roll back to SSLv3
           (because the server will not accept higher), that the version number
           is 0x03,0x01, not 0x03,0x00
           [Eric A. Young, (from changes to C2Net SSLeay, integrated by Mark Cox)]
      
      Submitted by:
      Reviewed by:
      PR:
      413c4f45
  13. 17 1月, 1999 1 次提交
  14. 08 1月, 1999 1 次提交
  15. 31 12月, 1998 1 次提交
    • R
      Fix version stuff: · 9cb0969f
      Ralf S. Engelschall 提交于
      1. The already released version was 0.9.1c and not 0.9.1b
      
      2. The next release should be 0.9.2 and not 0.9.1d, because
         first the changes are already too large, second we should avoid any more
         0.9.1x confusions and third, the Apache version semantics of
         VERSION.REVISION.PATCHLEVEL for the version string is reasonable (and here
         .2 is already just a patchlevel and not major change).
      tVS: ----------------------------------------------------------------------
      9cb0969f
  16. 23 12月, 1998 2 次提交
  17. 22 12月, 1998 1 次提交
  18. 21 12月, 1998 3 次提交