1. 27 1月, 2010 1 次提交
    • D
      PR: 1949 · d5e7f2f2
      Dr. Stephen Henson 提交于
      Submitted by: steve@openssl.org
      
      More robust fix and workaround for PR#1949. Don't try to work out if there
      is any write pending data as this can be unreliable: always flush.
      d5e7f2f2
  2. 09 12月, 2009 2 次提交
  3. 07 12月, 2009 1 次提交
  4. 14 7月, 2009 1 次提交
  5. 13 7月, 2009 1 次提交
  6. 20 4月, 2009 1 次提交
  7. 08 4月, 2009 1 次提交
  8. 28 1月, 2009 1 次提交
  9. 30 12月, 2008 1 次提交
  10. 29 12月, 2008 1 次提交
  11. 13 10月, 2008 1 次提交
  12. 10 10月, 2008 1 次提交
    • L
      When the underlying BIO_write() fails to send a datagram, we leave the · 7e7af0bc
      Lutz Jänicke 提交于
      offending record queued as 'pending'. The DTLS code doesn't expect this,
      and we end up hitting an OPENSSL_assert() in do_dtls1_write().
      
      The simple fix is just _not_ to leave it queued. In DTLS, dropping
      packets is perfectly acceptable -- and even preferable. If we wanted a
      service with retries and guaranteed delivery, we'd be using TCP.
      PR: #1703
      Submitted by: David Woodhouse <dwmw2@infradead.org>
      7e7af0bc
  13. 14 8月, 2008 1 次提交
  14. 05 8月, 2008 1 次提交
    • B
      Fix error codes for memory-saving patch. · 474b3b1c
      Bodo Möller 提交于
      Also, get rid of compile-time switch OPENSSL_NO_RELEASE_BUFFERS
      because it was rather pointless (the new behavior has to be explicitly
      requested by setting SSL_MODE_RELEASE_BUFFERS anyway).
      474b3b1c
  15. 03 6月, 2008 1 次提交
  16. 07 9月, 2007 1 次提交
  17. 31 8月, 2007 1 次提交
  18. 05 6月, 2007 1 次提交
  19. 29 11月, 2006 1 次提交
  20. 20 10月, 2006 1 次提交
  21. 08 10月, 2005 1 次提交
  22. 01 10月, 2005 1 次提交
  23. 09 5月, 2005 1 次提交
  24. 03 5月, 2005 1 次提交
  25. 27 4月, 2005 1 次提交
  26. 16 5月, 2004 1 次提交
  27. 19 2月, 2003 1 次提交
  28. 10 7月, 2002 1 次提交
    • L
      Reorder inclusion of header files: · 7b63c0fa
      Lutz Jänicke 提交于
      des_old.h redefines crypt:
      #define crypt(b,s)\
              DES_crypt((b),(s))
      
      This scheme leads to failure, if header files with the OS's true definition
      of crypt() are processed _after_ des_old.h was processed. This is e.g. the
      case on HP-UX with unistd.h.
      As evp.h now again includes des.h (which includes des_old.h), this problem
      only came up after this modification.
      Solution: move header files (indirectly) including e_os.h before the header
      files (indirectly) including evp.h.
      Submitted by:
      Reviewed by:
      PR:
      7b63c0fa
  29. 06 5月, 2002 2 次提交
  30. 29 4月, 2002 1 次提交
  31. 20 4月, 2002 1 次提交
  32. 14 4月, 2002 1 次提交
  33. 12 1月, 2002 1 次提交
  34. 29 12月, 2001 1 次提交
  35. 21 10月, 2001 1 次提交
    • B
      New functions SSL[_CTX]_set_msg_callback(). · a661b653
      Bodo Möller 提交于
      New macros SSL[_CTX]_set_msg_callback_arg().
      
      Message callback imlementation for SSL 3.0/TLS 1.0 (no SSL 2.0 yet).
      
      New '-msg' option for 'openssl s_client' and 'openssl s_server'
      that enable a message callback that displays all protocol messages.
      
      
      In ssl3_get_client_hello (ssl/s3_srvr.c), generate a fatal alert if
      client_version is smaller than the protocol version in use.
      Also change ssl23_get_client_hello (ssl/s23_srvr.c) to select TLS 1.0
      if the client demanded SSL 3.0 but only TLS 1.0 is enabled; then the
      client will at least see that alert.
      
      Fix SSL[_CTX]_ctrl prototype (void * instead of char * for generic
      pointer).
      
      Add/update some OpenSSL copyright notices.
      a661b653
  36. 16 10月, 2001 1 次提交
    • B
      Add per-SSL 'msg_callback' with 'msg_callback_arg'. · bf21446a
      Bodo Möller 提交于
      Both have per-SSL_CTX defaults.
      These new values can be set by calling SSL[_CTX]_[callback_]ctrl
      with codes SSL_CTRL_SET_MSG_CALLBACK and SSL_CTRL_SET_MSG_CALLBACK_ARG.
      
      So far, the callback is never actually called.
      
      
      Also rearrange some SSL_CTX struct members (some exist just in
      SSL_CTXs, others are defaults for SSLs and are either copied
      during SSL_new, or used if the value in the SSL is not set;
      these three classes of members were not in a logical order),
      and add some missing assignments to SSL_dup.
      bf21446a
  37. 21 9月, 2001 1 次提交
  38. 07 3月, 2001 1 次提交