History log of /openssl/ssl/ssl_rsa.c (Results 101 – 125 of 126)
Revision (<<< Hide revision tags) (Show revision tags >>>) Date Author Comments
# c2c2e7a4 23-May-2008 Lutz Jänicke

Clear error queue when starting SSL_CTX_use_certificate_chain_file
PR: 1417, 1513
Submitted by: Erik de Castro Lopo <mle+openssl@mega-nerd.com>


Revision tags: OpenSSL_0_9_8g, OpenSSL_0_9_8f, FIPS_098_TEST_8, FIPS_098_TEST_7, FIPS_098_TEST_6, FIPS_098_TEST_5, FIPS_098_TEST_4, FIPS_098_TEST_3, FIPS_098_TEST_2, FIPS_098_TEST_1, OpenSSL_0_9_7m, OpenSSL_0_9_8e, OpenSSL_0_9_7l, OpenSSL_0_9_8d, OpenSSL_0_9_8c, OpenSSL_0_9_7k, OpenSSL_0_9_7j, OpenSSL_0_9_8b, OpenSSL_FIPS_1_0, OpenSSL_0_9_7i, OpenSSL_0_9_8a, OpenSSL_0_9_7h, OpenSSL_0_9_8, FIPS_TEST_10, OpenSSL_0_9_8-beta6, OpenSSL_0_9_8-beta5, FIPS_TEST_9, OpenSSL_0_9_8-beta4, OpenSSL_0_9_8-beta3, BEN_FIPS_TEST_8, OpenSSL_0_9_8-beta2, OpenSSL_0_9_8-beta1, OpenSSL_0_9_7g
# dc0ed30c 08-Apr-2005 Nils Larsch

add support for DER encoded private keys to SSL_CTX_use_PrivateKey_file()
and SSL_use_PrivateKey_file()

PR: 1035
Submitted by: Walter Goulet
Reviewed by: Nils Larsch


# 6049399b 07-Apr-2005 Nils Larsch

get rid of very buggy and very imcomplete DH cert support

Reviewed by: Bodo Moeller


# 48c832b6 01-Apr-2005 Nils Larsch

really clear the error queue here

PR: 860


Revision tags: OpenSSL_0_9_7f, BEN_FIPS_TEST_7, BEN_FIPS_TEST_6, OpenSSL_0_9_7e, OpenSSL_0_9_7d, OpenSSL-engine-0_9_6m, OpenSSL_0_9_6m, LEVITTE_after_const
# 875a644a 15-Mar-2004 Richard Levitte

Constify d2i, s2i, c2i and r2i functions and other associated
functions and macros.

This change has associated tags: LEVITTE_before_const and
LEVITTE_after_const. Those will be remo

Constify d2i, s2i, c2i and r2i functions and other associated
functions and macros.

This change has associated tags: LEVITTE_before_const and
LEVITTE_after_const. Those will be removed when this change has been
properly reviewed.

show more ...


Revision tags: LEVITTE_before_const, BEN_FIPS_TEST_5, BEN_FIPS_TEST_4, OpenSSL-engine-0_9_6l, OpenSSL_0_9_6l, BEN_FIPS_TEST_3, BEN_FIPS_TEST_2, BEN_FIPS_TEST_1, OpenSSL-engine-0_9_6k, OpenSSL_0_9_6k, OpenSSL_0_9_7c
# 643ecd2e 11-Aug-2003 Bodo Möller

make sure no error is left in the queue that is intentionally ignored


Revision tags: OpenSSL-engine-0_9_6j, OpenSSL_0_9_7b, OpenSSL_0_9_6j, OpenSSL-engine-0_9_6i, OpenSSL_0_9_6i, OpenSSL_0_9_7a, OpenSSL_0_9_7, OpenSSL_0_9_7-beta6, STATE_after_zlib, STATE_before_zlib, OpenSSL_0_9_7-beta5, OpenSSL-engine-0_9_6h, OpenSSL_0_9_6h, OpenSSL_0_9_7-beta4, OpenSSL-engine-0_9_6g, OpenSSL_0_9_6g, OpenSSL-engine-0_9_6f, OpenSSL_0_9_6f, OpenSSL_0_9_7-beta3, OpenSSL-engine-0_9_6e, OpenSSL_0_9_6e
# 7b63c0fa 10-Jul-2002 Lutz Jänicke

Reorder inclusion of header files:

des_old.h redefines crypt:
#define crypt(b,s)\
DES_crypt((b),(s))

This scheme leads to failure, if header files with the OS's true

Reorder inclusion of header files:

des_old.h redefines crypt:
#define crypt(b,s)\
DES_crypt((b),(s))

This scheme leads to failure, if header files with the OS's true definition
of crypt() are processed _after_ des_old.h was processed. This is e.g. the
case on HP-UX with unistd.h.
As evp.h now again includes des.h (which includes des_old.h), this problem
only came up after this modification.
Solution: move header files (indirectly) including e_os.h before the header
files (indirectly) including evp.h.
Submitted by:
Reviewed by:
PR:

show more ...


Revision tags: OpenSSL_0_9_7-beta2, OpenSSL_0_9_7-beta1, AFTER_COMPAQ_PATCH, BEFORE_COMPAQ_PATCH, OpenSSL-engine-0_9_6d, OpenSSL_0_9_6d, OpenSSL-engine-0_9_6d-beta1, OpenSSL_0_9_6d-beta1
# 9437fef8 28-Feb-2002 Bodo Möller

use ERR_peek_last_error() instead of ERR_peek_error()


Revision tags: OpenSSL-engine-0_9_6c, OpenSSL_0_9_6c
# 6ac4e8bd 03-Sep-2001 Bodo Möller

Rename recently introduced functions for improved code clarity:
[DR]SA_up => [DR]SA_up_ref


# 78435364 25-Aug-2001 Geoff Thorpe

Changes crypto/evp/ and ssl/ code from directly incrementing reference
counts in DH, DSA, and RSA structures. Instead they use the new "***_up()"
functions that handle this.


Revision tags: OpenSSL-engine-0_9_6b, OpenSSL_0_9_6b, OpenSSL_0_9_6a, OpenSSL-engine-0_9_6a, OpenSSL-engine-0_9_6a-beta3, OpenSSL_0_9_6a-beta3, OpenSSL-engine-0_9_6a-beta2, OpenSSL_0_9_6a-beta2, OpenSSL-engine-0_9_6a-beta1, OpenSSL_0_9_6a-beta1
# bc36ee62 20-Feb-2001 Richard Levitte

Use new-style system-id macros everywhere possible. I hope I haven't
missed any.

This compiles and runs on Linux, and external applications have no
problems with it. The definite t

Use new-style system-id macros everywhere possible. I hope I haven't
missed any.

This compiles and runs on Linux, and external applications have no
problems with it. The definite test will be to build this on VMS.

show more ...


Revision tags: rsaref
# 5e4ca422 06-Nov-2000 Richard Levitte

The consequence of constification is that to pass the address to a
pointer to a const double pointe parameter, the pointer must point to
const data as well.


Revision tags: BEFORE_engine, OpenSSL_0_9_6-beta2, OpenSSL_0_9_6-beta1, OpenSSL_0_9_6, OpenSSL-engine-0_9_6, OpenSSL-engine-0_9_6-beta3, OpenSSL_0_9_6-beta3, OpenSSL-engine-0_9_6-beta2, OpenSSL-engine-0_9_6-beta1, OpenSSL_0_9_5, OpenSSL_0_9_5a, OpenSSL_0_9_5a-beta2, OpenSSL_0_9_5a-beta1, OpenSSL_0_9_5beta2, OpenSSL_0_9_5beta1, OpenSSL_0_9_4
# b1816a04 05-Aug-1999 Ralf S. Engelschall

typo while I poke around...


# 74678cc2 21-Jul-1999 Bodo Möller

Additional user data argument to pem_password_cb function type
and to lots of PEM_... functions.
Submitted by: Damien Miller <dmiller@ilogic.com.au>


Revision tags: OpenSSL_0_9_3a, OpenSSL_0_9_3, OpenSSL_0_9_3beta2, OpenSSL_0_9_3beta1
# ca8e5b9b 09-May-1999 Bodo Möller

Create a duplicate of the SSL_CTX's CERT in SSL_new instead of copying
pointers. The cert_st handling is changed by this in various ways.
Submitted by:
Reviewed by:
PR:


# 303c0028 09-May-1999 Bodo Möller

Use "const char *" instead of "char *" for filenames passed to functions.

Submitted by:
Reviewed by:
PR:


# b3ca645f 01-May-1999 Bodo Möller

New function SSL_CTX_use_certificate_chain_file.

Submitted by:
Reviewed by:
PR:


# a9be3af5 26-Apr-1999 Ulf Möller

Remove NOPROTO definitions and error code comments.


# ec577822 23-Apr-1999 Bodo Möller

Change #include filenames from <foo.h> to <openssl.h>.

Submitted by:
Reviewed by:
PR:


# 6b691a5c 19-Apr-1999 Ulf Möller

Change functions to ANSI C.


Revision tags: OpenSSL_0_9_2b
# 15d21c2d 25-Feb-1999 Ralf S. Engelschall

Add a bunch of SSL_xxx() functions for configuring the temporary RSA and DH
private keys and/or callback functions which directly correspond to their
SSL_CTX_xxx() counterparts but work on a

Add a bunch of SSL_xxx() functions for configuring the temporary RSA and DH
private keys and/or callback functions which directly correspond to their
SSL_CTX_xxx() counterparts but work on a per-connection basis. This is needed
for applications which have to configure certificates on a per-connection
basis (e.g. Apache+mod_ssl) instead of a per-context basis (e.g.
s_server).

For the RSA certificate situation is makes no difference, but for the DSA
certificate situation this fixes the "no shared cipher" problem where the
OpenSSL cipher selection procedure failed because the temporary keys were not
overtaken from the context and the API provided no way to reconfigure them.

The new functions now let applications reconfigure the stuff and they are in
detail: SSL_need_tmp_RSA, SSL_set_tmp_rsa, SSL_set_tmp_dh,
SSL_set_tmp_rsa_callback and SSL_set_tmp_dh_callback. Additionally a new
non-public-API function ssl_cert_instantiate() is used as a helper function
and also to reduce code redundancy inside ssl_rsa.c.

Submitted by: Ralf S. Engelschall
Reviewed by: Ben Laurie

show more ...


# 413c4f45 16-Feb-1999 Mark J. Cox

Updates to the new SSL compression code
[Eric A. Young, (from changes to C2Net SSLeay, integrated by Mark Cox)]

Fix so that the version number in the master secret, when passed

Updates to the new SSL compression code
[Eric A. Young, (from changes to C2Net SSLeay, integrated by Mark Cox)]

Fix so that the version number in the master secret, when passed
via RSA, checks that if TLS was proposed, but we roll back to SSLv3
(because the server will not accept higher), that the version number
is 0x03,0x01, not 0x03,0x00
[Eric A. Young, (from changes to C2Net SSLeay, integrated by Mark Cox)]

Submitted by:
Reviewed by:
PR:

show more ...


# a8236c8c 15-Feb-1999 Dr. Stephen Henson

Fix various memory leaks in SSL, apps and DSA


Revision tags: OpenSSL_0_9_1c, SSLeay_0_9_1b
# dfeab068 21-Dec-1998 Ralf S. Engelschall

Import of old SSLeay release: SSLeay 0.9.1b (unreleased)


Revision tags: SSLeay_0_9_0b
# 58964a49 21-Dec-1998 Ralf S. Engelschall

Import of old SSLeay release: SSLeay 0.9.0b


123456