- 09 2月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
some servers.
-
- 03 2月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 02 2月, 2012 2 次提交
-
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
- 31 1月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
structure. Before this the only way to add a custom chain was in the parent SSL_CTX (which is shared by all key types and SSL structures) or rely on auto chain building (which is performed on each handshake) from the trust store.
-
- 27 1月, 2012 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
certificate chain instead of an X509 structure. This makes it easier to enhance code in future and the chain output functions have access to the CERT_PKEY structure being used.
-
- 26 1月, 2012 5 次提交
-
-
由 Dr. Stephen Henson 提交于
New function ssl_add_cert_chain which adds a certificate chain to SSL internal BUF_MEM. Use this function in ssl3_output_cert_chain and dtls1_output_cert_chain instead of partly duplicating code.
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Andy Polyakov 提交于
-
由 Dr. Stephen Henson 提交于
-
- 25 1月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 22 1月, 2012 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 21 1月, 2012 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 19 1月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Thanks to Antonio Martin, Enterprise Secure Access Research and Development, Cisco Systems, Inc. for discovering this bug and preparing a fix. (CVE-2012-0050)
-
- 17 1月, 2012 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
The cipher definitions of these ciphersuites have been around since SSLeay but were always disabled. Now OpenSSL supports DH certificates they can be finally enabled. Various additional changes were needed to make them work properly: many unused fixed DH sections of code were untested.
-
- 16 1月, 2012 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 15 1月, 2012 3 次提交
-
-
由 Andy Polyakov 提交于
PR: 2613 Submitted by: Leena Heino
-
由 Dr. Stephen Henson 提交于
-
由 Andy Polyakov 提交于
-
- 13 1月, 2012 3 次提交
-
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
(most restrictive about r2 and r13 usage).
-
由 Andy Polyakov 提交于
are passed zero-extended, not sign-extended. PR: 2682
-
- 12 1月, 2012 5 次提交
-
-
由 Andy Polyakov 提交于
PR: 2677 Submitted by: Annue Yousar
-
由 Andy Polyakov 提交于
PR: 2683 Submitted by: Annie Yousar
-
由 Andy Polyakov 提交于
PR: 2681 Submitted by: Annie Yousar
-
由 Andy Polyakov 提交于
PR: 2678 Submitted by: Annie Yousar
-
由 Andy Polyakov 提交于
PR: 2675 Submitted by: Annie Yousar
-
- 11 1月, 2012 1 次提交
-
-
由 Andy Polyakov 提交于
PR: 2685
-
- 10 1月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 06 1月, 2012 2 次提交
-
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
- 05 1月, 2012 5 次提交
-
-
由 Bodo Möller 提交于
(While the 1.0.0f CHANGES entry on VOS PRNG seeding was missing in HEAD, the actual code is here already.)
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
Submitted by: Brian Carlstrom
-
由 Dr. Stephen Henson 提交于
Submitted by: steve Update maximum message size for certifiate verify messages to support 4096 bit RSA keys again as TLS v1.2 messages is two bytes longer.
-
由 Dr. Stephen Henson 提交于
Reviewed by: steve Send fatal alert if heartbeat extension has an illegal value.
-