OpenSSL 1.0.1h headers
This commit is contained in:
parent
9e1e66d4bf
commit
db63a7c3d3
|
@ -25,11 +25,11 @@
|
||||||
* (Prior to 0.9.5a beta1, a different scheme was used: MMNNFFRBB for
|
* (Prior to 0.9.5a beta1, a different scheme was used: MMNNFFRBB for
|
||||||
* major minor fix final patch/beta)
|
* major minor fix final patch/beta)
|
||||||
*/
|
*/
|
||||||
#define OPENSSL_VERSION_NUMBER 0x1000107fL
|
#define OPENSSL_VERSION_NUMBER 0x1000108fL
|
||||||
#ifdef OPENSSL_FIPS
|
#ifdef OPENSSL_FIPS
|
||||||
#define OPENSSL_VERSION_TEXT "OpenSSL 1.0.1g-fips 7 Apr 2014"
|
#define OPENSSL_VERSION_TEXT "OpenSSL 1.0.1h-fips 5 Jun 2014"
|
||||||
#else
|
#else
|
||||||
#define OPENSSL_VERSION_TEXT "OpenSSL 1.0.1g 7 Apr 2014"
|
#define OPENSSL_VERSION_TEXT "OpenSSL 1.0.1h 5 Jun 2014"
|
||||||
#endif
|
#endif
|
||||||
#define OPENSSL_VERSION_PTEXT " part of " OPENSSL_VERSION_TEXT
|
#define OPENSSL_VERSION_PTEXT " part of " OPENSSL_VERSION_TEXT
|
||||||
|
|
||||||
|
|
|
@ -453,6 +453,7 @@ void ERR_load_PKCS7_strings(void);
|
||||||
#define PKCS7_R_ERROR_SETTING_CIPHER 121
|
#define PKCS7_R_ERROR_SETTING_CIPHER 121
|
||||||
#define PKCS7_R_INVALID_MIME_TYPE 131
|
#define PKCS7_R_INVALID_MIME_TYPE 131
|
||||||
#define PKCS7_R_INVALID_NULL_POINTER 143
|
#define PKCS7_R_INVALID_NULL_POINTER 143
|
||||||
|
#define PKCS7_R_INVALID_SIGNED_DATA_TYPE 155
|
||||||
#define PKCS7_R_MIME_NO_CONTENT_TYPE 132
|
#define PKCS7_R_MIME_NO_CONTENT_TYPE 132
|
||||||
#define PKCS7_R_MIME_PARSE_ERROR 133
|
#define PKCS7_R_MIME_PARSE_ERROR 133
|
||||||
#define PKCS7_R_MIME_SIG_PARSE_ERROR 134
|
#define PKCS7_R_MIME_SIG_PARSE_ERROR 134
|
||||||
|
|
|
@ -553,7 +553,7 @@ struct ssl_session_st
|
||||||
/* Allow initial connection to servers that don't support RI */
|
/* Allow initial connection to servers that don't support RI */
|
||||||
#define SSL_OP_LEGACY_SERVER_CONNECT 0x00000004L
|
#define SSL_OP_LEGACY_SERVER_CONNECT 0x00000004L
|
||||||
#define SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG 0x00000008L
|
#define SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG 0x00000008L
|
||||||
#define SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG 0x00000010L
|
#define SSL_OP_TLSEXT_PADDING 0x00000010L
|
||||||
#define SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER 0x00000020L
|
#define SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER 0x00000020L
|
||||||
#define SSL_OP_SAFARI_ECDHE_ECDSA_BUG 0x00000040L
|
#define SSL_OP_SAFARI_ECDHE_ECDSA_BUG 0x00000040L
|
||||||
#define SSL_OP_SSLEAY_080_CLIENT_DH_BUG 0x00000080L
|
#define SSL_OP_SSLEAY_080_CLIENT_DH_BUG 0x00000080L
|
||||||
|
@ -562,6 +562,8 @@ struct ssl_session_st
|
||||||
|
|
||||||
/* Hasn't done anything since OpenSSL 0.9.7h, retained for compatibility */
|
/* Hasn't done anything since OpenSSL 0.9.7h, retained for compatibility */
|
||||||
#define SSL_OP_MSIE_SSLV2_RSA_PADDING 0x0
|
#define SSL_OP_MSIE_SSLV2_RSA_PADDING 0x0
|
||||||
|
/* Refers to ancient SSLREF and SSLv2, retained for compatibility */
|
||||||
|
#define SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG 0x0
|
||||||
|
|
||||||
/* Disable SSL 3.0/TLS 1.0 CBC vulnerability workaround that was added
|
/* Disable SSL 3.0/TLS 1.0 CBC vulnerability workaround that was added
|
||||||
* in OpenSSL 0.9.6d. Usually (depending on the application protocol)
|
* in OpenSSL 0.9.6d. Usually (depending on the application protocol)
|
||||||
|
|
|
@ -388,6 +388,7 @@ typedef struct ssl3_buffer_st
|
||||||
#define TLS1_FLAGS_TLS_PADDING_BUG 0x0008
|
#define TLS1_FLAGS_TLS_PADDING_BUG 0x0008
|
||||||
#define TLS1_FLAGS_SKIP_CERT_VERIFY 0x0010
|
#define TLS1_FLAGS_SKIP_CERT_VERIFY 0x0010
|
||||||
#define TLS1_FLAGS_KEEP_HANDSHAKE 0x0020
|
#define TLS1_FLAGS_KEEP_HANDSHAKE 0x0020
|
||||||
|
#define SSL3_FLAGS_CCS_OK 0x0080
|
||||||
|
|
||||||
/* SSL3_FLAGS_SGC_RESTART_DONE is set when we
|
/* SSL3_FLAGS_SGC_RESTART_DONE is set when we
|
||||||
* restart a handshake because of MS SGC and so prevents us
|
* restart a handshake because of MS SGC and so prevents us
|
||||||
|
|
Loading…
Reference in New Issue