- 27 1月, 2010 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: steve@openssl.org More robust fix and workaround for PR#1949. Don't try to work out if there is any write pending data as this can be unreliable: always flush.
-
- 09 12月, 2009 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
- 07 12月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 14 7月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 13 7月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 20 4月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 08 4月, 2009 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 28 1月, 2009 1 次提交
-
-
由 Richard Levitte 提交于
-
- 30 12月, 2008 1 次提交
-
-
由 Ben Laurie 提交于
test for them!
-
- 29 12月, 2008 1 次提交
-
-
由 Ben Laurie 提交于
(Coverity ID 135).
-
- 13 10月, 2008 1 次提交
-
-
由 Lutz Jänicke 提交于
but has been omitted from HEAD (0.9.9), see commit http://cvs.openssl.org/chngview?cn=16627 by appro.
-
- 10 10月, 2008 1 次提交
-
-
由 Lutz Jänicke 提交于
offending record queued as 'pending'. The DTLS code doesn't expect this, and we end up hitting an OPENSSL_assert() in do_dtls1_write(). The simple fix is just _not_ to leave it queued. In DTLS, dropping packets is perfectly acceptable -- and even preferable. If we wanted a service with retries and guaranteed delivery, we'd be using TCP. PR: #1703 Submitted by: David Woodhouse <dwmw2@infradead.org>
-
- 14 8月, 2008 1 次提交
-
-
由 Bodo Möller 提交于
PR: 1679
-
- 05 8月, 2008 1 次提交
-
-
由 Bodo Möller 提交于
Also, get rid of compile-time switch OPENSSL_NO_RELEASE_BUFFERS because it was rather pointless (the new behavior has to be explicitly requested by setting SSL_MODE_RELEASE_BUFFERS anyway).
-
- 03 6月, 2008 1 次提交
-
-
由 Ben Laurie 提交于
-
- 07 9月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
and cast from pointer to int of different size (linux-x86_64 and align).
-
- 31 8月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Submitted by: Victor B. Wagner <vitus@cryptocom.ru>
-
- 05 6月, 2007 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 29 11月, 2006 1 次提交
-
-
由 Bodo Möller 提交于
-
- 20 10月, 2006 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 08 10月, 2005 1 次提交
-
-
由 Dr. Stephen Henson 提交于
maximum send fragment size. Allocate I/O buffers accordingly.
-
- 01 10月, 2005 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 09 5月, 2005 1 次提交
-
-
由 Bodo Möller 提交于
during "make errors" and thus during "make update". Fix lots of bugs that util/ck_errf.pl can detect automatically. Various others of these are still left to fix; that's why "make update" will complain loudly when run now.
-
- 03 5月, 2005 1 次提交
-
-
由 Nils Larsch 提交于
-
- 27 4月, 2005 1 次提交
-
-
由 Ben Laurie 提交于
-
- 16 5月, 2004 1 次提交
-
-
由 Dr. Stephen Henson 提交于
PR: 851
-
- 19 2月, 2003 1 次提交
-
-
由 Richard Levitte 提交于
An advisory will be posted to the web. Expect a release within the hour.
-
- 10 7月, 2002 1 次提交
-
-
由 Lutz Jänicke 提交于
des_old.h redefines crypt: #define crypt(b,s)\ DES_crypt((b),(s)) This scheme leads to failure, if header files with the OS's true definition of crypt() are processed _after_ des_old.h was processed. This is e.g. the case on HP-UX with unistd.h. As evp.h now again includes des.h (which includes des_old.h), this problem only came up after this modification. Solution: move header files (indirectly) including e_os.h before the header files (indirectly) including evp.h. Submitted by: Reviewed by: PR:
-
- 06 5月, 2002 2 次提交
-
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
- 29 4月, 2002 1 次提交
-
-
由 Richard Levitte 提交于
-
- 20 4月, 2002 1 次提交
-
-
由 Richard Levitte 提交于
Notified by Bernd Matthes <bernd.matthes@gemplus.com>
-
- 14 4月, 2002 1 次提交
-
-
由 Bodo Möller 提交于
Fix length checks in ssl3_get_client_hello(). Use s->s3->in_read_app_data differently to fix ssl3_read_internal().
-
- 12 1月, 2002 1 次提交
-
-
由 Ben Laurie 提交于
-
- 29 12月, 2001 1 次提交
-
-
由 Ulf Möller 提交于
Submitted by: D P Chang <dpc@qualys.com> Reviewed by: Bodo
-
- 21 10月, 2001 1 次提交
-
-
由 Bodo Möller 提交于
New macros SSL[_CTX]_set_msg_callback_arg(). Message callback imlementation for SSL 3.0/TLS 1.0 (no SSL 2.0 yet). New '-msg' option for 'openssl s_client' and 'openssl s_server' that enable a message callback that displays all protocol messages. In ssl3_get_client_hello (ssl/s3_srvr.c), generate a fatal alert if client_version is smaller than the protocol version in use. Also change ssl23_get_client_hello (ssl/s23_srvr.c) to select TLS 1.0 if the client demanded SSL 3.0 but only TLS 1.0 is enabled; then the client will at least see that alert. Fix SSL[_CTX]_ctrl prototype (void * instead of char * for generic pointer). Add/update some OpenSSL copyright notices.
-
- 16 10月, 2001 1 次提交
-
-
由 Bodo Möller 提交于
Both have per-SSL_CTX defaults. These new values can be set by calling SSL[_CTX]_[callback_]ctrl with codes SSL_CTRL_SET_MSG_CALLBACK and SSL_CTRL_SET_MSG_CALLBACK_ARG. So far, the callback is never actually called. Also rearrange some SSL_CTX struct members (some exist just in SSL_CTXs, others are defaults for SSLs and are either copied during SSL_new, or used if the value in the SSL is not set; these three classes of members were not in a logical order), and add some missing assignments to SSL_dup.
-
- 21 9月, 2001 1 次提交
-
-
由 Bodo Möller 提交于
reveal whether illegal block cipher padding was found or a MAC verification error occured. In ssl/s2_pkt.c, verify that the purported number of padding bytes is in the legal range.
-
- 07 3月, 2001 1 次提交
-
-
由 Bodo Möller 提交于
-