- Feb 27, 2001
-
-
Richard Levitte authored
Spotted by Pieter Bowman <bowman@math.utah.edu>
-
- Feb 26, 2001
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
Enhance OCSP_request_verify() so it finds the signers certificate properly and supports several flags.
-
Richard Levitte authored
Note that all *_it variables are suddenly non-existant according to libeay.num. This is a bug that will be corrected. Please be patient.
-
Richard Levitte authored
-
- Feb 25, 2001
-
-
Dr. Stephen Henson authored
the errant field for more ASN1 error conditions.
-
- Feb 24, 2001
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
Print out OID of unknown signature or public key algorithms.
-
Dr. Stephen Henson authored
key algorithms and leaking if the signature verify fails.
-
- Feb 23, 2001
-
-
Lutz Jänicke authored
-
Lutz Jänicke authored
-
Ulf Möller authored
like to use libtool, but not automake. Let's investigate that further, or leave the question open for now.
-
Ulf Möller authored
-
Dr. Stephen Henson authored
or serial number.
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
prototype hack. This unfortunately means that every ASN1_*_END construct cannot have a trailing ;
-
Richard Levitte authored
-
Dr. Stephen Henson authored
change the way ASN1 modules are exported. Still needs a bit of work for example the hack which a dummy function prototype to avoid compilers warning about multiple ;s.
-
Geoff Thorpe authored
-
Geoff Thorpe authored
an SSL_CTX's session cache, it is necessary to compare the ssl_version at the same time (a conflict is defined, courtesy of SSL_SESSION_cmp(), as a matching id/id_length pair and a matching ssl_version). However, the SSL_SESSION that will result from the current negotiation does not necessarily have the same ssl version as the "SSL_METHOD" in use by the SSL_CTX - part of the work in a handshake is to agree on an ssl version! This is fixed by having the check function accept an SSL pointer rather than the SSL_CTX it belongs to. [Thanks to Lutz for illuminating the full extent of my stupidity]
-
- Feb 22, 2001
-
-
Richard Levitte authored
Define the right macro for Linux and other GNU-based systems to get a correct declaration of strdup()
-
Richard Levitte authored
-
Richard Levitte authored
really see why we need to define these function pointers with MS_FAR if it's not done cosistently everywhere. If we decide to support MS_FAR modifiers, it's better to have the named something more unique for OpenSSL and to define them in e_os2.h.
-
Richard Levitte authored
Define the OPENSSL_NO_* macros as NO_* macros for the sake of applications thathaven't yet been changed
-
Bodo Möller authored
-
Bodo Möller authored
to include (but the OpenSSL_0_9_6-stable branche still has inconsistencies)
-
Bodo Möller authored
-
Richard Levitte authored
and make all files the depend on it include it without prefixing it with openssl/. This means that all Makefiles will have $(TOP) as one of the include directories.
-
Richard Levitte authored
compared to it has the type size_t. Included the needed headers to make that happen.
-
Richard Levitte authored
defined there.
-
Richard Levitte authored
-
Richard Levitte authored
OPENSSL_UNISTD before redefining it, to avoid compiler warnings.
-
Richard Levitte authored
pre-CRYPTO_MEM_LEAK_CB time.
-
Richard Levitte authored
make strcasecmp a macro to _stricmp.
-
Richard Levitte authored
The reason is that some parts are only included when certain other include files have been included. Also, it seems that the rest of the OpenSSL code assumes that all kinds of M$ Windows are MSDOS as well...
-
Richard Levitte authored
-
Richard Levitte authored
there's no point creating an alias for it.
-
Richard Levitte authored
SSL_add_dir_cert_subjects_to_stack is not implemented on WIN32 and VMS, so declare it the same way.
-
Dr. Stephen Henson authored
Rebuild ASN1 error codes to remove unused function and reason codes.
-
- Feb 21, 2001
-
-
Geoff Thorpe authored
the ID will be padded out to 16 bytes if the callback attempted to generate a shorter one. The problem is that the uniqueness checking function used in callbacks may mistakenly think a 9-byte ID is unique when in fact its padded 16-byte version is not. This makes the checking function detect SSLv2 cases, and ensures the padded form is checked rather than the shorter one passed by the callback.
-