#
c2c2e7a4 |
| 23-May-2008 |
Lutz Jänicke |
Clear error queue when starting SSL_CTX_use_certificate_chain_file PR: 1417, 1513 Submitted by: Erik de Castro Lopo <mle+openssl@mega-nerd.com>
|
Revision tags: OpenSSL_0_9_8g, OpenSSL_0_9_8f, FIPS_098_TEST_8, FIPS_098_TEST_7, FIPS_098_TEST_6, FIPS_098_TEST_5, FIPS_098_TEST_4, FIPS_098_TEST_3, FIPS_098_TEST_2, FIPS_098_TEST_1, OpenSSL_0_9_7m, OpenSSL_0_9_8e, OpenSSL_0_9_7l, OpenSSL_0_9_8d, OpenSSL_0_9_8c, OpenSSL_0_9_7k, OpenSSL_0_9_7j, OpenSSL_0_9_8b, OpenSSL_FIPS_1_0, OpenSSL_0_9_7i, OpenSSL_0_9_8a, OpenSSL_0_9_7h, OpenSSL_0_9_8, FIPS_TEST_10, OpenSSL_0_9_8-beta6, OpenSSL_0_9_8-beta5, FIPS_TEST_9, OpenSSL_0_9_8-beta4, OpenSSL_0_9_8-beta3, BEN_FIPS_TEST_8, OpenSSL_0_9_8-beta2, OpenSSL_0_9_8-beta1, OpenSSL_0_9_7g |
|
#
dc0ed30c |
| 08-Apr-2005 |
Nils Larsch |
add support for DER encoded private keys to SSL_CTX_use_PrivateKey_file() and SSL_use_PrivateKey_file() PR: 1035 Submitted by: Walter Goulet Reviewed by: Nils Larsch
|
#
6049399b |
| 07-Apr-2005 |
Nils Larsch |
get rid of very buggy and very imcomplete DH cert support Reviewed by: Bodo Moeller
|
#
48c832b6 |
| 01-Apr-2005 |
Nils Larsch |
really clear the error queue here PR: 860
|
Revision tags: OpenSSL_0_9_7f, BEN_FIPS_TEST_7, BEN_FIPS_TEST_6, OpenSSL_0_9_7e, OpenSSL_0_9_7d, OpenSSL-engine-0_9_6m, OpenSSL_0_9_6m, LEVITTE_after_const |
|
#
875a644a |
| 15-Mar-2004 |
Richard Levitte |
Constify d2i, s2i, c2i and r2i functions and other associated functions and macros. This change has associated tags: LEVITTE_before_const and LEVITTE_after_const. Those will be remo
Constify d2i, s2i, c2i and r2i functions and other associated functions and macros. This change has associated tags: LEVITTE_before_const and LEVITTE_after_const. Those will be removed when this change has been properly reviewed.
show more ...
|
Revision tags: LEVITTE_before_const, BEN_FIPS_TEST_5, BEN_FIPS_TEST_4, OpenSSL-engine-0_9_6l, OpenSSL_0_9_6l, BEN_FIPS_TEST_3, BEN_FIPS_TEST_2, BEN_FIPS_TEST_1, OpenSSL-engine-0_9_6k, OpenSSL_0_9_6k, OpenSSL_0_9_7c |
|
#
643ecd2e |
| 11-Aug-2003 |
Bodo Möller |
make sure no error is left in the queue that is intentionally ignored
|
Revision tags: OpenSSL-engine-0_9_6j, OpenSSL_0_9_7b, OpenSSL_0_9_6j, OpenSSL-engine-0_9_6i, OpenSSL_0_9_6i, OpenSSL_0_9_7a, OpenSSL_0_9_7, OpenSSL_0_9_7-beta6, STATE_after_zlib, STATE_before_zlib, OpenSSL_0_9_7-beta5, OpenSSL-engine-0_9_6h, OpenSSL_0_9_6h, OpenSSL_0_9_7-beta4, OpenSSL-engine-0_9_6g, OpenSSL_0_9_6g, OpenSSL-engine-0_9_6f, OpenSSL_0_9_6f, OpenSSL_0_9_7-beta3, OpenSSL-engine-0_9_6e, OpenSSL_0_9_6e |
|
#
7b63c0fa |
| 10-Jul-2002 |
Lutz Jänicke |
Reorder inclusion of header files: des_old.h redefines crypt: #define crypt(b,s)\ DES_crypt((b),(s)) This scheme leads to failure, if header files with the OS's true
Reorder inclusion of header files: des_old.h redefines crypt: #define crypt(b,s)\ DES_crypt((b),(s)) This scheme leads to failure, if header files with the OS's true definition of crypt() are processed _after_ des_old.h was processed. This is e.g. the case on HP-UX with unistd.h. As evp.h now again includes des.h (which includes des_old.h), this problem only came up after this modification. Solution: move header files (indirectly) including e_os.h before the header files (indirectly) including evp.h. Submitted by: Reviewed by: PR:
show more ...
|
Revision tags: OpenSSL_0_9_7-beta2, OpenSSL_0_9_7-beta1, AFTER_COMPAQ_PATCH, BEFORE_COMPAQ_PATCH, OpenSSL-engine-0_9_6d, OpenSSL_0_9_6d, OpenSSL-engine-0_9_6d-beta1, OpenSSL_0_9_6d-beta1 |
|
#
9437fef8 |
| 28-Feb-2002 |
Bodo Möller |
use ERR_peek_last_error() instead of ERR_peek_error()
|
Revision tags: OpenSSL-engine-0_9_6c, OpenSSL_0_9_6c |
|
#
6ac4e8bd |
| 03-Sep-2001 |
Bodo Möller |
Rename recently introduced functions for improved code clarity: [DR]SA_up => [DR]SA_up_ref
|
#
78435364 |
| 25-Aug-2001 |
Geoff Thorpe |
Changes crypto/evp/ and ssl/ code from directly incrementing reference counts in DH, DSA, and RSA structures. Instead they use the new "***_up()" functions that handle this.
|
Revision tags: OpenSSL-engine-0_9_6b, OpenSSL_0_9_6b, OpenSSL_0_9_6a, OpenSSL-engine-0_9_6a, OpenSSL-engine-0_9_6a-beta3, OpenSSL_0_9_6a-beta3, OpenSSL-engine-0_9_6a-beta2, OpenSSL_0_9_6a-beta2, OpenSSL-engine-0_9_6a-beta1, OpenSSL_0_9_6a-beta1 |
|
#
bc36ee62 |
| 20-Feb-2001 |
Richard Levitte |
Use new-style system-id macros everywhere possible. I hope I haven't missed any. This compiles and runs on Linux, and external applications have no problems with it. The definite t
Use new-style system-id macros everywhere possible. I hope I haven't missed any. This compiles and runs on Linux, and external applications have no problems with it. The definite test will be to build this on VMS.
show more ...
|
Revision tags: rsaref |
|
#
5e4ca422 |
| 06-Nov-2000 |
Richard Levitte |
The consequence of constification is that to pass the address to a pointer to a const double pointe parameter, the pointer must point to const data as well.
|
Revision tags: BEFORE_engine, OpenSSL_0_9_6-beta2, OpenSSL_0_9_6-beta1, OpenSSL_0_9_6, OpenSSL-engine-0_9_6, OpenSSL-engine-0_9_6-beta3, OpenSSL_0_9_6-beta3, OpenSSL-engine-0_9_6-beta2, OpenSSL-engine-0_9_6-beta1, OpenSSL_0_9_5, OpenSSL_0_9_5a, OpenSSL_0_9_5a-beta2, OpenSSL_0_9_5a-beta1, OpenSSL_0_9_5beta2, OpenSSL_0_9_5beta1, OpenSSL_0_9_4 |
|
#
b1816a04 |
| 05-Aug-1999 |
Ralf S. Engelschall |
typo while I poke around...
|
#
74678cc2 |
| 21-Jul-1999 |
Bodo Möller |
Additional user data argument to pem_password_cb function type and to lots of PEM_... functions. Submitted by: Damien Miller <dmiller@ilogic.com.au>
|
Revision tags: OpenSSL_0_9_3a, OpenSSL_0_9_3, OpenSSL_0_9_3beta2, OpenSSL_0_9_3beta1 |
|
#
ca8e5b9b |
| 09-May-1999 |
Bodo Möller |
Create a duplicate of the SSL_CTX's CERT in SSL_new instead of copying pointers. The cert_st handling is changed by this in various ways. Submitted by: Reviewed by: PR:
|
#
303c0028 |
| 09-May-1999 |
Bodo Möller |
Use "const char *" instead of "char *" for filenames passed to functions. Submitted by: Reviewed by: PR:
|
#
b3ca645f |
| 01-May-1999 |
Bodo Möller |
New function SSL_CTX_use_certificate_chain_file. Submitted by: Reviewed by: PR:
|
#
a9be3af5 |
| 26-Apr-1999 |
Ulf Möller |
Remove NOPROTO definitions and error code comments.
|
#
ec577822 |
| 23-Apr-1999 |
Bodo Möller |
Change #include filenames from <foo.h> to <openssl.h>. Submitted by: Reviewed by: PR:
|
#
6b691a5c |
| 19-Apr-1999 |
Ulf Möller |
Change functions to ANSI C.
|
Revision tags: OpenSSL_0_9_2b |
|
#
15d21c2d |
| 25-Feb-1999 |
Ralf S. Engelschall |
Add a bunch of SSL_xxx() functions for configuring the temporary RSA and DH private keys and/or callback functions which directly correspond to their SSL_CTX_xxx() counterparts but work on a
Add a bunch of SSL_xxx() functions for configuring the temporary RSA and DH private keys and/or callback functions which directly correspond to their SSL_CTX_xxx() counterparts but work on a per-connection basis. This is needed for applications which have to configure certificates on a per-connection basis (e.g. Apache+mod_ssl) instead of a per-context basis (e.g. s_server). For the RSA certificate situation is makes no difference, but for the DSA certificate situation this fixes the "no shared cipher" problem where the OpenSSL cipher selection procedure failed because the temporary keys were not overtaken from the context and the API provided no way to reconfigure them. The new functions now let applications reconfigure the stuff and they are in detail: SSL_need_tmp_RSA, SSL_set_tmp_rsa, SSL_set_tmp_dh, SSL_set_tmp_rsa_callback and SSL_set_tmp_dh_callback. Additionally a new non-public-API function ssl_cert_instantiate() is used as a helper function and also to reduce code redundancy inside ssl_rsa.c. Submitted by: Ralf S. Engelschall Reviewed by: Ben Laurie
show more ...
|
#
413c4f45 |
| 16-Feb-1999 |
Mark J. Cox |
Updates to the new SSL compression code [Eric A. Young, (from changes to C2Net SSLeay, integrated by Mark Cox)] Fix so that the version number in the master secret, when passed
Updates to the new SSL compression code [Eric A. Young, (from changes to C2Net SSLeay, integrated by Mark Cox)] Fix so that the version number in the master secret, when passed via RSA, checks that if TLS was proposed, but we roll back to SSLv3 (because the server will not accept higher), that the version number is 0x03,0x01, not 0x03,0x00 [Eric A. Young, (from changes to C2Net SSLeay, integrated by Mark Cox)] Submitted by: Reviewed by: PR:
show more ...
|
#
a8236c8c |
| 15-Feb-1999 |
Dr. Stephen Henson |
Fix various memory leaks in SSL, apps and DSA
|
Revision tags: OpenSSL_0_9_1c, SSLeay_0_9_1b |
|
#
dfeab068 |
| 21-Dec-1998 |
Ralf S. Engelschall |
Import of old SSLeay release: SSLeay 0.9.1b (unreleased)
|
Revision tags: SSLeay_0_9_0b |
|
#
58964a49 |
| 21-Dec-1998 |
Ralf S. Engelschall |
Import of old SSLeay release: SSLeay 0.9.0b
|