- Nov 09, 2001
-
-
Bodo Möller authored
Submitted by: "Stefan Marxen" <stefan.marxen@gmx.net>
-
- Nov 08, 2001
-
-
Bodo Möller authored
-
Bodo Möller authored
_REENTRANT if threads support is enabled, the ./Configure entry must define it so that it ends up in CFLAG.
-
- Oct 29, 2001
-
-
Richard Levitte authored
Addapt VMS scripts to the newer disk layout system ODS-5, which allows more than one period and mixed size characters in file names
-
- Oct 26, 2001
-
-
Bodo Möller authored
-
Bodo Möller authored
-
- Oct 25, 2001
-
-
Bodo Möller authored
-
Bodo Möller authored
change)
-
Bodo Möller authored
-
Bodo Möller authored
-
- Oct 24, 2001
-
-
Bodo Möller authored
never resets s->method to s->ctx->method when called from within one of the SSL handshake functions.
-
- Oct 20, 2001
-
-
Bodo Möller authored
client_version is smaller than the protocol version in use. Also change ssl23_get_client_hello (ssl/s23_srvr.c) to select TLS 1.0 if the client demanded SSL 3.0 but only TLS 1.0 is enabled; then the client will at least see that alert.
-
Dr. Stephen Henson authored
-
- Oct 16, 2001
-
-
Lutz Jänicke authored
-
- Oct 15, 2001
-
-
Bodo Möller authored
-
Bodo Möller authored
-
Bodo Möller authored
case of ssl3_accept
-
- Oct 14, 2001
-
-
Ulf Möller authored
Submitted by: Toomas Kiisk <vix@cyber.ee>
-
- Oct 12, 2001
-
-
Lutz Jänicke authored
From: "Chris D. Peterson" <cpeterson@aventail.com> Subject: Implementation Issues with OpenSSL To: openssl-users@openssl.org Date: Wed, 22 Aug 2001 16:13:17 -0700 The patch included in the original post may improve the internal session list handling (and is therefore worth a seperate investigation). No change to the list handling will however solve the problems of incorrect SSL_SESSION_free() calls. The session list is only one possible point of failure, dangling pointers would also occur for SSL object currently using the session. The correct solution is to only use SSL_SESSION_free() when applicable!
-
- Oct 11, 2001
-
-
Richard Levitte authored
such cases, a flush should *not* attempt to finalise the encoding, as the EVP_ENCODE_CTX structure will only be filled with garbage. For the same reason, do the same check when a wpending is performed.
-
Richard Levitte authored
-pedantic, or some parts of the source will raise complaints from the compiler.
-
- Oct 10, 2001
-
-
Richard Levitte authored
-
Richard Levitte authored
-
Richard Levitte authored
-
- Oct 08, 2001
-
-
Lutz Jänicke authored
-
- Oct 01, 2001
-
-
Lutz Jänicke authored
-
- Sep 24, 2001
-
-
Richard Levitte authored
Noticed by Thomas Klausner <wiz@danbala.ifoer.tuwien.ac.at>.
-
Bodo Möller authored
-
- Sep 22, 2001
-
-
Bodo Möller authored
-
- Sep 21, 2001
-
-
Bodo Möller authored
-
Bodo Möller authored
just sent a HelloRequest.
-
Bodo Möller authored
-
- Sep 20, 2001
-
-
Bodo Möller authored
-
Bodo Möller authored
reveal whether illegal block cipher padding was found or a MAC verification error occured. In ssl/s2_pkt.c, verify that the purported number of padding bytes is in the legal range.
-
- Sep 14, 2001
-
-
Bodo Möller authored
-
Bodo Möller authored
branch (revision 1.50, 2000-11-17)
-
- Sep 13, 2001
-
-
Lutz Jänicke authored
-
Lutz Jänicke authored
-
cvs2svn authored
'OpenSSL_0_9_6-stable'.
-
Lutz Jänicke authored
-