- May 25, 2011
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Reviewed by: steve Fix BIO_accept so it can be bound to IPv4 or IPv6 sockets consistently.
-
Dr. Stephen Henson authored
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Reviewed by: steve Fully implement SSL_clear for DTLS.
-
Dr. Stephen Henson authored
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Reviewed by: steve Fix DTLS session resumption timer bug.
-
Dr. Stephen Henson authored
-
- May 21, 2011
-
-
Dr. Stephen Henson authored
-
Richard Levitte authored
-
- May 20, 2011
-
-
Dr. Stephen Henson authored
than client side as we need to keep the handshake record cache frozen when it contains all the records need to process the certificate verify message. (backport from HEAD).
-
- May 19, 2011
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
add FIPS support to ssl: doesn't do anything on this branch yet as there is no FIPS compilation support
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
- May 15, 2011
-
-
Dr. Stephen Henson authored
-
- May 13, 2011
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
- May 12, 2011
-
-
Dr. Stephen Henson authored
Parse certificate request message and set digests appropriately. Generate new TLS v1.2 format certificate verify message. Keep handshake caches around for longer as they are needed for client auth.
-
Dr. Stephen Henson authored
Make sure message is long enough for signature algorithms. (backport from HEAD).
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
default. If we don't do it this way, it screws up libeay.num. (update from HEAD, original from levitte).
-
Dr. Stephen Henson authored
-
- May 11, 2011
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
This includes TLS v1.2 server and client support but at present client certificate support is not implemented.
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
all ssl related structures are opaque and internals cannot be directly accessed. Many applications will need some modification to support this and most likely some additional functions added to OpenSSL. The advantage of this option is that any application supporting it will still be binary compatible if SSL structures change. (backport from HEAD).
-
- May 08, 2011
-
-
Dr. Stephen Henson authored
-
- Apr 30, 2011
-
-
Dr. Stephen Henson authored
-
- Apr 06, 2011
-
-
Dr. Stephen Henson authored
-
- Apr 03, 2011
-
-
Dr. Stephen Henson authored
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Reviewed by: steve Fix DTLS Retransmission Buffer Bug
-
Dr. Stephen Henson authored
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Reviewed by: steve Don't change state when answering DTLS ClientHello.
-
Dr. Stephen Henson authored
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Reviewed by: steve Fix DTLS fragment reassembly bug.
-
- Mar 25, 2011
-
-
Richard Levitte authored
Submitted by Steven M. Schweda <sms@antinode.info>
-
Dr. Stephen Henson authored
-
Richard Levitte authored
different options: "64" The build system will choose /POINTER_SIZE=64=ARGV if the compiler supports it, otherwise /POINTER_SIZE=64. "64=" The build system will force /POINTER_SIZE=64. "64=ARGV" The build system will force /POINTER_SIZE=64=ARGV.
-
- Mar 23, 2011
-
-
Richard Levitte authored
This meant a slight renumbering in util/libeay.num due to symbols appearing in 1.0.0-stable. However, since there's been no release on this branch yet, it should be harmless.
-