- Feb 23, 2001
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
prototype hack. This unfortunately means that every ASN1_*_END construct cannot have a trailing ;
-
Richard Levitte authored
-
Dr. Stephen Henson authored
change the way ASN1 modules are exported. Still needs a bit of work for example the hack which a dummy function prototype to avoid compilers warning about multiple ;s.
-
Geoff Thorpe authored
-
Geoff Thorpe authored
an SSL_CTX's session cache, it is necessary to compare the ssl_version at the same time (a conflict is defined, courtesy of SSL_SESSION_cmp(), as a matching id/id_length pair and a matching ssl_version). However, the SSL_SESSION that will result from the current negotiation does not necessarily have the same ssl version as the "SSL_METHOD" in use by the SSL_CTX - part of the work in a handshake is to agree on an ssl version! This is fixed by having the check function accept an SSL pointer rather than the SSL_CTX it belongs to. [Thanks to Lutz for illuminating the full extent of my stupidity]
-
- Feb 22, 2001
-
-
Richard Levitte authored
Define the right macro for Linux and other GNU-based systems to get a correct declaration of strdup()
-
Richard Levitte authored
-
Richard Levitte authored
really see why we need to define these function pointers with MS_FAR if it's not done cosistently everywhere. If we decide to support MS_FAR modifiers, it's better to have the named something more unique for OpenSSL and to define them in e_os2.h.
-
Richard Levitte authored
Define the OPENSSL_NO_* macros as NO_* macros for the sake of applications thathaven't yet been changed
-
Bodo Möller authored
-
Bodo Möller authored
to include (but the OpenSSL_0_9_6-stable branche still has inconsistencies)
-
Bodo Möller authored
-
Richard Levitte authored
and make all files the depend on it include it without prefixing it with openssl/. This means that all Makefiles will have $(TOP) as one of the include directories.
-
Richard Levitte authored
compared to it has the type size_t. Included the needed headers to make that happen.
-
Richard Levitte authored
defined there.
-
Richard Levitte authored
-
Richard Levitte authored
OPENSSL_UNISTD before redefining it, to avoid compiler warnings.
-
Richard Levitte authored
pre-CRYPTO_MEM_LEAK_CB time.
-
Richard Levitte authored
make strcasecmp a macro to _stricmp.
-
Richard Levitte authored
The reason is that some parts are only included when certain other include files have been included. Also, it seems that the rest of the OpenSSL code assumes that all kinds of M$ Windows are MSDOS as well...
-
Richard Levitte authored
-
Richard Levitte authored
there's no point creating an alias for it.
-
Richard Levitte authored
SSL_add_dir_cert_subjects_to_stack is not implemented on WIN32 and VMS, so declare it the same way.
-
Dr. Stephen Henson authored
Rebuild ASN1 error codes to remove unused function and reason codes.
-
- Feb 21, 2001
-
-
Geoff Thorpe authored
the ID will be padded out to 16 bytes if the callback attempted to generate a shorter one. The problem is that the uniqueness checking function used in callbacks may mistakenly think a 9-byte ID is unique when in fact its padded 16-byte version is not. This makes the checking function detect SSLv2 cases, and ensures the padded form is checked rather than the shorter one passed by the callback.
-
Geoff Thorpe authored
-
Geoff Thorpe authored
of session IDs. Namely, passing "-id_prefix <text>" will set a generate_session_id() callback that generates session IDs as random data with <text> block-copied over the top of the start of the ID. This can be viewed by watching the session ID s_client's output when it connects. This is mostly useful for testing any SSL/TLS code (eg. proxies) that wish to deal with multiple servers, when each of which might be generating a unique range of session IDs (eg. with a certain prefix).
-
Geoff Thorpe authored
SSL/TLS session IDs in a server. According to RFC2246, the session ID is an arbitrary value chosen by the server. It can be useful to have some control over this "arbitrary value" so as to choose it in ways that can aid in things like external session caching and balancing (eg. clustering). The default session ID generation is to fill the ID with random data. The callback used by default is built in to ssl_sess.c, but registering a callback in an SSL_CTX or in a particular SSL overrides this. BTW: SSL callbacks will override SSL_CTX callbacks, and a new SSL structure inherits any callback set in its 'parent' SSL_CTX. The header comments describe how this mechanism ticks, and source code comments describe (hopefully) why it ticks the way it does. Man pages are on the way ... [NB: Lutz was also hacking away and helping me to figure out how best to do this.]
-
Geoff Thorpe authored
-
Richard Levitte authored
-
Richard Levitte authored
form '#if defined(...) || defined(...) || ...' and '#if !defined(...) && !defined(...) && ...'. This also avoids the growing number of special cases it was previously handling (some of them wrongly).
-
Richard Levitte authored
-
- Feb 20, 2001
-
-
Richard Levitte authored
-
Richard Levitte authored
example) are declared with some extra linkage information. This generates a warning when using the function name as a value to a regular function pointer with the "correct" definition of the function. Therefore, use a macro to cast the appropriate function on VMS.
-
Richard Levitte authored
strings.h according to X/Open.
-
Richard Levitte authored
was made in a certain sequence. This change restores the earlier "chain of command".
-
Richard Levitte authored
-
Geoff Thorpe authored
callbacks, and their prototypes were consistent as they were. These casts need reversing. Also, I personally find line breaks during parameter lists (ie a line ending in a comma) easier to read at a glance than line breaks at the end of a function call and before a dereference on the return value (ie a line ending in a closed-bracket followed by a line starting with "->").
-
Ulf Möller authored
-