1. 09 8月, 2002 1 次提交
    • B
      ECC ciphersuite support · ea262260
      Bodo Möller 提交于
      Submitted by: Douglas Stebila <douglas.stebila@sun.com>
      (Authors: Vipul Gupta and Sumit Gupta, Sun Microsystems Laboratories)
      ea262260
  2. 02 8月, 2002 1 次提交
  3. 30 7月, 2002 1 次提交
    • L
      OpenSSL Security Advisory [30 July 2002] · c046fffa
      Lutz Jänicke 提交于
      Changes marked "(CHATS)" were sponsored by the Defense Advanced
      Research Projects Agency (DARPA) and Air Force Research Laboratory,
      Air Force Materiel Command, USAF, under agreement number
      F30602-01-2-0537.
      c046fffa
  4. 10 11月, 2001 1 次提交
  5. 21 9月, 2001 1 次提交
  6. 10 7月, 2001 1 次提交
    • R
      Patches from Vern Staats <staatsvr@asc.hpc.mil> to get Kerberos 5 in · 2a1ef754
      Richard Levitte 提交于
      SSL according to RFC 2712.  His comment is:
      
      This is a patch to openssl-SNAP-20010702 to support Kerberized SSL
      authentication.  I'm expecting to have the full kssl-0.5 kit up on
      sourceforge by the end of the week.  The full kit includes patches
      for mod-ssl, apache, and a few text clients.  The sourceforge URL
      is http://sourceforge.net/projects/kssl/ .
      
      Thanks to a note from Simon Wilkinson I've replaced my KRB5 AP_REQ
      message with a real KerberosWrapper struct.  I think this is fully
      RFC 2712 compliant now, including support for the optional
      authenticator field.  I also added openssl-style ASN.1 macros for
      a few Kerberos structs; see crypto/krb5/ if you're interested.
      2a1ef754
  7. 08 4月, 2001 1 次提交
  8. 09 3月, 2001 1 次提交
  9. 07 3月, 2001 1 次提交
  10. 06 3月, 2001 1 次提交
  11. 22 2月, 2001 1 次提交
    • G
      This change allows a callback to be used to override the generation of · dc644fe2
      Geoff Thorpe 提交于
      SSL/TLS session IDs in a server. According to RFC2246, the session ID is an
      arbitrary value chosen by the server. It can be useful to have some control
      over this "arbitrary value" so as to choose it in ways that can aid in
      things like external session caching and balancing (eg. clustering). The
      default session ID generation is to fill the ID with random data.
      
      The callback used by default is built in to ssl_sess.c, but registering a
      callback in an SSL_CTX or in a particular SSL overrides this. BTW: SSL
      callbacks will override SSL_CTX callbacks, and a new SSL structure inherits
      any callback set in its 'parent' SSL_CTX. The header comments describe how
      this mechanism ticks, and source code comments describe (hopefully) why it
      ticks the way it does.
      
      Man pages are on the way ...
      
      [NB: Lutz was also hacking away and helping me to figure out how best to do
      this.]
      dc644fe2
  12. 20 2月, 2001 1 次提交
  13. 28 12月, 2000 1 次提交
  14. 15 12月, 2000 1 次提交
  15. 28 11月, 2000 1 次提交
  16. 27 11月, 2000 1 次提交
  17. 23 9月, 2000 1 次提交
  18. 14 3月, 2000 1 次提交
  19. 05 3月, 2000 1 次提交
  20. 25 2月, 2000 1 次提交
  21. 24 2月, 2000 1 次提交
  22. 21 2月, 2000 1 次提交
  23. 04 2月, 2000 1 次提交
  24. 22 1月, 2000 1 次提交
  25. 14 1月, 2000 1 次提交
  26. 11 1月, 2000 1 次提交
  27. 30 11月, 1999 1 次提交
  28. 17 5月, 1999 1 次提交
  29. 13 5月, 1999 1 次提交
  30. 11 5月, 1999 2 次提交
  31. 10 5月, 1999 1 次提交
  32. 02 5月, 1999 1 次提交
  33. 01 5月, 1999 1 次提交
  34. 24 4月, 1999 2 次提交
  35. 20 4月, 1999 1 次提交
  36. 22 3月, 1999 1 次提交
  37. 06 3月, 1999 1 次提交
  38. 01 3月, 1999 1 次提交