- May 19, 2011
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
- May 15, 2011
-
-
Dr. Stephen Henson authored
-
- May 13, 2011
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
- May 12, 2011
-
-
Dr. Stephen Henson authored
Parse certificate request message and set digests appropriately. Generate new TLS v1.2 format certificate verify message. Keep handshake caches around for longer as they are needed for client auth.
-
Dr. Stephen Henson authored
Make sure message is long enough for signature algorithms. (backport from HEAD).
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
default. If we don't do it this way, it screws up libeay.num. (update from HEAD, original from levitte).
-
Dr. Stephen Henson authored
-
- May 11, 2011
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
This includes TLS v1.2 server and client support but at present client certificate support is not implemented.
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
all ssl related structures are opaque and internals cannot be directly accessed. Many applications will need some modification to support this and most likely some additional functions added to OpenSSL. The advantage of this option is that any application supporting it will still be binary compatible if SSL structures change. (backport from HEAD).
-
- May 08, 2011
-
-
Dr. Stephen Henson authored
-
- Apr 30, 2011
-
-
Dr. Stephen Henson authored
-
- Apr 06, 2011
-
-
Dr. Stephen Henson authored
-
- Apr 03, 2011
-
-
Dr. Stephen Henson authored
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Reviewed by: steve Fix DTLS Retransmission Buffer Bug
-
Dr. Stephen Henson authored
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Reviewed by: steve Don't change state when answering DTLS ClientHello.
-
Dr. Stephen Henson authored
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Reviewed by: steve Fix DTLS fragment reassembly bug.
-
- Mar 25, 2011
-
-
Richard Levitte authored
Submitted by Steven M. Schweda <sms@antinode.info>
-
Dr. Stephen Henson authored
-
Richard Levitte authored
different options: "64" The build system will choose /POINTER_SIZE=64=ARGV if the compiler supports it, otherwise /POINTER_SIZE=64. "64=" The build system will force /POINTER_SIZE=64. "64=ARGV" The build system will force /POINTER_SIZE=64=ARGV.
-
- Mar 23, 2011
-
-
Richard Levitte authored
This meant a slight renumbering in util/libeay.num due to symbols appearing in 1.0.0-stable. However, since there's been no release on this branch yet, it should be harmless.
-
- Mar 22, 2011
-
-
Richard Levitte authored
more need to be added...
-
- Mar 20, 2011
-
-
Richard Levitte authored
-
Richard Levitte authored
with turning trapping back on. * test/maketests.com: Do the same check for /POINTER_SIZE=64=ARGV here. * test/clean-test.com: A new script for cleaning up.
-
Richard Levitte authored
-
Richard Levitte authored
directly in main(). 'if needed' also includes when argv is a 32 bit pointer in an otherwise 64 bit environment. * apps/makeapps.com: When using /POINTER_SIZE=64, try to use the additional =ARGV, but only if it's supported. Fortunately, DCL is very helpful telling us in this case.
-
- Mar 19, 2011
-
-
Richard Levitte authored
-
Richard Levitte authored
are in the Unix Makefiles, and add SRP tests.
-
Richard Levitte authored
-
Richard Levitte authored
-
Richard Levitte authored
install scripts. This could need some more work.
-
Richard Levitte authored
-
Richard Levitte authored
-