1. 21 9月, 2001 1 次提交
  2. 10 7月, 2001 1 次提交
    • R
      Patches from Vern Staats <staatsvr@asc.hpc.mil> to get Kerberos 5 in · 2a1ef754
      Richard Levitte 提交于
      SSL according to RFC 2712.  His comment is:
      
      This is a patch to openssl-SNAP-20010702 to support Kerberized SSL
      authentication.  I'm expecting to have the full kssl-0.5 kit up on
      sourceforge by the end of the week.  The full kit includes patches
      for mod-ssl, apache, and a few text clients.  The sourceforge URL
      is http://sourceforge.net/projects/kssl/ .
      
      Thanks to a note from Simon Wilkinson I've replaced my KRB5 AP_REQ
      message with a real KerberosWrapper struct.  I think this is fully
      RFC 2712 compliant now, including support for the optional
      authenticator field.  I also added openssl-style ASN.1 macros for
      a few Kerberos structs; see crypto/krb5/ if you're interested.
      2a1ef754
  3. 08 4月, 2001 1 次提交
  4. 09 3月, 2001 1 次提交
  5. 07 3月, 2001 1 次提交
  6. 06 3月, 2001 1 次提交
  7. 22 2月, 2001 1 次提交
    • G
      This change allows a callback to be used to override the generation of · dc644fe2
      Geoff Thorpe 提交于
      SSL/TLS session IDs in a server. According to RFC2246, the session ID is an
      arbitrary value chosen by the server. It can be useful to have some control
      over this "arbitrary value" so as to choose it in ways that can aid in
      things like external session caching and balancing (eg. clustering). The
      default session ID generation is to fill the ID with random data.
      
      The callback used by default is built in to ssl_sess.c, but registering a
      callback in an SSL_CTX or in a particular SSL overrides this. BTW: SSL
      callbacks will override SSL_CTX callbacks, and a new SSL structure inherits
      any callback set in its 'parent' SSL_CTX. The header comments describe how
      this mechanism ticks, and source code comments describe (hopefully) why it
      ticks the way it does.
      
      Man pages are on the way ...
      
      [NB: Lutz was also hacking away and helping me to figure out how best to do
      this.]
      dc644fe2
  8. 20 2月, 2001 1 次提交
  9. 28 12月, 2000 1 次提交
  10. 15 12月, 2000 1 次提交
  11. 28 11月, 2000 1 次提交
  12. 27 11月, 2000 1 次提交
  13. 23 9月, 2000 1 次提交
  14. 14 3月, 2000 1 次提交
  15. 05 3月, 2000 1 次提交
  16. 25 2月, 2000 1 次提交
  17. 24 2月, 2000 1 次提交
  18. 21 2月, 2000 1 次提交
  19. 04 2月, 2000 1 次提交
  20. 22 1月, 2000 1 次提交
  21. 14 1月, 2000 1 次提交
  22. 11 1月, 2000 1 次提交
  23. 30 11月, 1999 1 次提交
  24. 17 5月, 1999 1 次提交
  25. 13 5月, 1999 1 次提交
  26. 11 5月, 1999 2 次提交
  27. 10 5月, 1999 1 次提交
  28. 02 5月, 1999 1 次提交
  29. 01 5月, 1999 1 次提交
  30. 24 4月, 1999 2 次提交
  31. 20 4月, 1999 1 次提交
  32. 22 3月, 1999 1 次提交
  33. 06 3月, 1999 1 次提交
  34. 01 3月, 1999 1 次提交
  35. 25 2月, 1999 1 次提交
    • R
      Add a bunch of SSL_xxx() functions for configuring the temporary RSA and DH · 15d21c2d
      Ralf S. Engelschall 提交于
      private keys and/or callback functions which directly correspond to their
      SSL_CTX_xxx() counterparts but work on a per-connection basis. This is needed
      for applications which have to configure certificates on a per-connection
      basis (e.g. Apache+mod_ssl) instead of a per-context basis (e.g.
      s_server).
      
      For the RSA certificate situation is makes no difference, but for the DSA
      certificate situation this fixes the "no shared cipher" problem where the
      OpenSSL cipher selection procedure failed because the temporary keys were not
      overtaken from the context and the API provided no way to reconfigure them.
      
      The new functions now let applications reconfigure the stuff and they are in
      detail: SSL_need_tmp_RSA, SSL_set_tmp_rsa, SSL_set_tmp_dh,
      SSL_set_tmp_rsa_callback and SSL_set_tmp_dh_callback.  Additionally a new
      non-public-API function ssl_cert_instantiate() is used as a helper function
      and also to reduce code redundancy inside ssl_rsa.c.
      
      Submitted by: Ralf S. Engelschall
      Reviewed by: Ben Laurie
      15d21c2d
  36. 20 2月, 1999 1 次提交
  37. 16 2月, 1999 1 次提交
    • M
      Updates to the new SSL compression code · 413c4f45
      Mark J. Cox 提交于
           [Eric A. Young, (from changes to C2Net SSLeay, integrated by Mark Cox)]
      
      Fix so that the version number in the master secret, when passed
           via RSA, checks that if TLS was proposed, but we roll back to SSLv3
           (because the server will not accept higher), that the version number
           is 0x03,0x01, not 0x03,0x00
           [Eric A. Young, (from changes to C2Net SSLeay, integrated by Mark Cox)]
      
      Submitted by:
      Reviewed by:
      PR:
      413c4f45
  38. 21 12月, 1998 1 次提交