- 20 5月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Alexei Khlebnikov <alexei.khlebnikov@opera.com> Reviewed by: steve OOM checking. Leak in OOM fix. Fall-through comment. Duplicate code elimination.
-
- 30 4月, 2011 2 次提交
-
-
由 Dr. Stephen Henson 提交于
checking added, SHA256 PRF support added. At present only RSA key exchange ciphersuites work with TLS v1.2 as the new signature format is not yet implemented.
-
由 Dr. Stephen Henson 提交于
OPENSSL_NO_SSL_INTERN all ssl related structures are opaque and internals cannot be directly accessed. Many applications will need some modification to support this and most likely some additional functions added to OpenSSL. The advantage of this option is that any application supporting it will still be binary compatible if SSL structures change.
-
- 13 3月, 2011 1 次提交
-
-
由 Ben Laurie 提交于
-
- 06 9月, 2010 1 次提交
-
-
由 Ben Laurie 提交于
-
- 28 7月, 2010 1 次提交
-
-
由 Ben Laurie 提交于
-
- 21 1月, 2010 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 07 1月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
1. Add provisional SCSV value. 2. Don't send SCSV and RI at same time. 3. Fatal error is SCSV received when renegotiating.
-
- 28 12月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
MCSV is now called SCSV. Don't send SCSV if renegotiating. Also note if RI is empty in debug messages.
-
- 17 12月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 08 12月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
work in SSLv3: initial handshake has no extensions but includes MCSV, if server indicates RI support then renegotiation handshakes include RI. NB: current MCSV value is bogus for testing only, will be updated when we have an official value. Change mismatch alerts to handshake_failure as required by spec. Also have some debugging fprintfs so we can clearly see what is going on if OPENSSL_RI_DEBUG is set.
-
- 10 11月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 17 6月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Reviewed by: steve@openssl.org Various GOST ciphersuite and ENGINE fixes. Including... Allow EVP_PKEY_set_derive_peerkey() in encryption operations. New flag when certificate verify should be omitted in client key exchange.
-
- 29 5月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 12 10月, 2008 1 次提交
-
-
由 Ben Laurie 提交于
-
- 27 9月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 23 9月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 21 9月, 2007 1 次提交
-
-
由 Bodo Möller 提交于
(draft-rescorla-tls-opaque-prf-input-00.txt), and do some cleanups and bugfixes on the way. In particular, this fixes the buffer bounds checks in ssl_add_clienthello_tlsext() and in ssl_add_serverhello_tlsext(). Note that the opaque PRF Input TLS extension is not compiled by default; see CHANGES.
-
- 31 8月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Victor B. Wagner <vitus@cryptocom.ru>
-
- 12 8月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
for OpenSSL.
-
- 05 6月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 20 10月, 2006 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 15 6月, 2006 1 次提交
-
-
由 Bodo Möller 提交于
-
- 19 12月, 2005 1 次提交
-
-
由 Andy Polyakov 提交于
from .h files...
-
- 08 10月, 2005 1 次提交
-
-
由 Dr. Stephen Henson 提交于
maximum send fragment size. Allocate I/O buffers accordingly.
-
- 01 10月, 2005 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 08 6月, 2005 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 31 5月, 2005 1 次提交
-
-
由 Richard Levitte 提交于
have a uniform representation for those over all architectures, so a little bit of hackery is needed. Contributed by nagendra modadugu <nagendra@cs.stanford.edu>
-
- 28 4月, 2005 1 次提交
-
-
由 Dr. Stephen Henson 提交于
1. "unsigned long long" isn't portable changed: to BN_ULLONG. 2. The LL prefix isn't allowed in VC++ but it isn't needed where it is used. 2. Avoid lots of compiler warnings about signed/unsigned mismatches. 3. Include new library directory pqueue in mk1mf build system. 4. Update symbols.
-
- 27 4月, 2005 2 次提交
-
-
由 Bodo Möller 提交于
-
由 Ben Laurie 提交于
-
- 26 11月, 2002 1 次提交
-
-
由 Richard Levitte 提交于
PR: 349
-
- 16 10月, 2002 2 次提交
-
-
由 Richard Levitte 提交于
PR: 189
-
由 Richard Levitte 提交于
PR: 189
-
- 10 10月, 2002 2 次提交
-
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
PR: 189
-
- 09 8月, 2002 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Douglas Stebila <douglas.stebila@sun.com> (Authors: Vipul Gupta and Sumit Gupta, Sun Microsystems Laboratories)
-
- 14 4月, 2002 1 次提交
-
-
由 Bodo Möller 提交于
Fix length checks in ssl3_get_client_hello(). Use s->s3->in_read_app_data differently to fix ssl3_read_internal().
-
- 20 2月, 2001 1 次提交
-
-
由 Richard Levitte 提交于
sure they are available in opensslconf.h, by giving them names starting with "OPENSSL_" to avoid conflicts with other packages and by making sure e_os2.h will cover all platform-specific cases together with opensslconf.h. I've checked fairly well that nothing breaks with this (apart from external software that will adapt if they have used something like NO_KRB5), but I can't guarantee it completely, so a review of this change would be a good thing.
-