1. 11 6月, 2005 1 次提交
  2. 27 4月, 2005 3 次提交
  3. 31 3月, 2005 1 次提交
  4. 30 3月, 2005 1 次提交
  5. 07 9月, 2004 1 次提交
  6. 21 5月, 2004 1 次提交
  7. 18 5月, 2004 1 次提交
  8. 26 3月, 2004 1 次提交
  9. 16 3月, 2004 1 次提交
  10. 29 11月, 2003 1 次提交
  11. 11 10月, 2003 1 次提交
  12. 06 10月, 2003 2 次提交
    • R
    • R
      Make sure int SSL_COMP_add_compression_method() checks if a certain · 82423549
      Richard Levitte 提交于
      compression identity is already present among the registered
      compression methods, and if so, reject the addition request.
      
      Declare SSL_COMP_get_compression_method() so it can be used properly.
      
      Change ssltest.c so it checks what compression methods are available
      and enumerates them.  As a side-effect, built-in compression methods
      will be automagically loaded that way.  Additionally, change the
      identities for ZLIB and RLE to be conformant to
      draft-ietf-tls-compression-05.txt.
      
      Finally, make update.
      
      Next on my list: have the built-in compression methods added
      "automatically" instead of requiring that the author call
      SSL_COMP_add_compression_method() or
      SSL_COMP_get_compression_methods().
      82423549
  13. 16 2月, 2003 1 次提交
  14. 13 2月, 2003 1 次提交
  15. 06 2月, 2003 1 次提交
  16. 08 12月, 2002 2 次提交
  17. 13 11月, 2002 1 次提交
  18. 29 10月, 2002 1 次提交
    • G
      Correct and enhance the behaviour of "internal" session caching as it · e0db2eed
      Geoff Thorpe 提交于
      relates to SSL_CTX flags and the use of "external" session caching. The
      existing flag, "SSL_SESS_CACHE_NO_INTERNAL_LOOKUP" remains but is
      supplemented with a complimentary flag, "SSL_SESS_CACHE_NO_INTERNAL_STORE".
      The bitwise OR of the two flags is also defined as
      "SSL_SESS_CACHE_NO_INTERNAL" and is the flag that should be used by most
      applications wanting to implement session caching *entirely* by its own
      provided callbacks. As the documented behaviour contradicted actual
      behaviour up until recently, and since that point behaviour has itself been
      inconsistent anyway, this change should not introduce any compatibility
      problems. I've adjusted the relevant documentation to elaborate about how
      this works.
      
      Kudos to "Nadav Har'El" <nyh@math.technion.ac.il> for diagnosing these
      anomalies and testing this patch for correctness.
      
      PR: 311
      e0db2eed
  19. 14 10月, 2002 1 次提交
  20. 10 10月, 2002 2 次提交
  21. 09 8月, 2002 1 次提交
    • B
      ECC ciphersuite support · ea262260
      Bodo Möller 提交于
      Submitted by: Douglas Stebila <douglas.stebila@sun.com>
      (Authors: Vipul Gupta and Sumit Gupta, Sun Microsystems Laboratories)
      ea262260
  22. 02 8月, 2002 1 次提交
  23. 30 7月, 2002 1 次提交
    • L
      OpenSSL Security Advisory [30 July 2002] · c046fffa
      Lutz Jänicke 提交于
      Changes marked "(CHATS)" were sponsored by the Defense Advanced
      Research Projects Agency (DARPA) and Air Force Research Laboratory,
      Air Force Materiel Command, USAF, under agreement number
      F30602-01-2-0537.
      c046fffa
  24. 20 7月, 2002 1 次提交
  25. 04 7月, 2002 1 次提交
  26. 14 6月, 2002 1 次提交
  27. 07 5月, 2002 2 次提交
  28. 06 5月, 2002 1 次提交
  29. 12 3月, 2002 1 次提交
    • D
      · 98fa4fe8
      Dr. Stephen Henson 提交于
      Fix ASN1 additions for KRB5
      98fa4fe8
  30. 28 2月, 2002 1 次提交
  31. 15 1月, 2002 1 次提交
  32. 12 1月, 2002 2 次提交
  33. 18 12月, 2001 1 次提交