summaryrefslogtreecommitdiff
path: root/ssl/s3_both.c
Commit message (Expand)AuthorAgeFilesLines
* Add and use a constant-time memcmp.Ben Laurie2013-02-061-1/+1
* recognise X9.42 DH certificates on serversDr. Stephen Henson2012-04-181-1/+1
* Revise ssl code to use a CERT_PKEY structure when outputting aDr. Stephen Henson2012-01-261-2/+2
* Tidy/enhance certificate chain output code.Dr. Stephen Henson2012-01-261-73/+3
* Support for fixed DH ciphersuites.Dr. Stephen Henson2012-01-161-0/+12
* Fixes to NPN from Adam Langley.Ben Laurie2010-09-051-3/+3
* Add Next Protocol Negotiation.Ben Laurie2010-07-281-0/+34
* PR: 1731 and maybe 2197Dr. Stephen Henson2010-03-241-0/+2
* First cut of renegotiation extension. (port to HEAD)Dr. Stephen Henson2009-11-091-0/+34
* PR: 2022Dr. Stephen Henson2009-09-021-5/+15
* Update from 1.0.0-stable.Dr. Stephen Henson2009-07-151-13/+13
* Update from 0.9.8-stable.Dr. Stephen Henson2009-06-281-43/+41
* Fix signed/unsigned warning.Geoff Thorpe2008-08-051-1/+1
* Fix error codes for memory-saving patch.Bodo Möller2008-08-041-3/+3
* Memory saving patch.Ben Laurie2008-06-031-6/+130
* Update ssl code to support digests other than MD5+SHA1 in handshake.Dr. Stephen Henson2007-08-311-4/+9
* Align data payload for better performance.Andy Polyakov2006-10-201-4/+8
* New option SSL_OP_NO_COMP to disable compression. New ctrls to setDr. Stephen Henson2005-10-081-7/+21
* Add DTLS support.Ben Laurie2005-04-261-4/+4
* get rid of very buggy and very imcomplete DH cert supportNils Larsch2005-04-071-25/+1
* Option to disable SSL auto chain buildDr. Stephen Henson2003-02-121-3/+14
* Security fixes brought forward from 0.9.7.Ben Laurie2002-11-131-4/+4
* remove commentBodo Möller2002-08-121-8/+0
* get rid of EVP_PKEY_ECDSA (now we have EVP_PKEY_EC instead)Bodo Möller2002-08-121-5/+2
* ECC ciphersuite supportBodo Möller2002-08-091-0/+22
* Reorder inclusion of header files:Lutz Jänicke2002-07-101-1/+1
* Implement known-IV countermeasure.Bodo Möller2002-04-131-7/+11
* Map new X509 verification errors to alert codes (Tom Wu <tom@arcot.com>).Lutz Jänicke2002-03-191-0/+7
* Call msg_callback with correct length parameter if ssl3_write_bytes had toBodo Möller2001-10-201-1/+1
* New functions SSL[_CTX]_set_msg_callback().Bodo Möller2001-10-201-2/+10
* Add per-SSL 'msg_callback' with 'msg_callback_arg'.Bodo Möller2001-10-161-1/+1
* For consistency, set s->init_num in the 'reuse_message' caseBodo Möller2001-10-151-1/+2
* Change ssl3_get_message and the functions using it so that completeBodo Möller2001-10-151-9/+15
* Fix ssl3_get_message handle message fragmentation correctly.Bodo Möller2001-10-151-0/+1
* bugfix: handle HelloRequest received during handshake correctlyBodo Möller2001-09-211-0/+4
* Make the necessary changes to work with the recent "ex_data" overhaul.Geoff Thorpe2001-09-011-1/+5
* Initial CRL based revocation checking.Dr. Stephen Henson2001-05-071-0/+1
* Use new-style system-id macros everywhere possible. I hope I haven'tRichard Levitte2001-02-201-1/+1
* First step towards SSL_peek fix.Bodo Möller2000-12-141-2/+2
* There have been a number of complaints from a number of sources that namesRichard Levitte2000-06-011-2/+2
* Add OpenSSL licen[cs]e.Bodo Möller2000-02-251-0/+53
* Change EVP_MD_CTX_type so it is more logical and add EVP_MD_CTX_md forDr. Stephen Henson2000-02-221-1/+1
* Fix some bugs and document othersBodo Möller2000-02-211-2/+3
* Move ssl3_do_write from s3_pkt.c to s3_both.c.Bodo Möller2000-02-211-0/+20
* Move MAC computations for Finished from ssl3_read_bytes intoBodo Möller2000-02-211-5/+10
* ignore Client Hellos when we're in handshake anywayBodo Möller2000-02-201-9/+23
* Tolerate fragmentation and interleaving in the SSL 3/TLS record layer.Bodo Möller2000-02-201-14/+23
* Some comments added, and slight code clean-ups.Bodo Möller2000-01-261-0/+5
* Use less complicated arrangement for data strutures related to FinishedBodo Möller2000-01-061-34/+7
* Use separate arrays for certificate verify and for finished hashes.Bodo Möller2000-01-061-4/+33