summaryrefslogtreecommitdiff
path: root/ssl/s3_srvr.c
Commit message (Expand)AuthorAgeFilesLines
* Merge main -> VMS_64BITBRANCH_VMS_64BITRichard Levitte2010-01-271-360/+1001
* Recent (and not so recent) changes from HEAD.Richard Levitte2004-06-281-0/+2
* Changes from 0.9.8-devRichard Levitte2004-03-241-2/+3
* This branch hasn't been updated with changes from HEAD for a looooong time...Richard Levitte2004-01-231-8/+31
* All the changes from HEAD since last merge.Richard Levitte2003-04-041-15/+26
* Recent changes from HEAD.Richard Levitte2002-12-021-3/+3
* Recent changes from HEADRichard Levitte2002-11-271-1/+1
* (almost) recent changes from HEAD.Richard Levitte2002-11-151-3/+3
* Recent changes from HEAD. The VMS procedures are probably broken, toRichard Levitte2002-10-311-14/+1
* Merge in recent changes from main.Richard Levitte2002-10-021-5/+12
* Merge in all the changes from HEAD.Richard Levitte2002-08-131-18/+494
* Merge in the latest changes from HEAD.Richard Levitte2002-07-181-2/+2
* Implement known-IV countermeasure.Bodo Möller2002-04-131-2/+9
* Initialize cipher context in KRB5Dr. Stephen Henson2002-03-141-0/+2
* Fix Kerberos warnings with VC++.Dr. Stephen Henson2002-03-121-1/+1
* Fix various warnings when compiling with KRB5 code.Dr. Stephen Henson2002-03-121-4/+4
* Bugfix: In ssl3_accept, don't use a local variable 'got_new_session'Bodo Möller2002-01-141-4/+3
* Prototype info function.Ben Laurie2002-01-121-1/+1
* Consistency with s2_... and s23_... variants (no real functionalBodo Möller2001-10-251-1/+1
* Fix SSL handshake functions and SSL_clear() such that SSL_clear()Bodo Möller2001-10-241-1/+1
* New functions SSL[_CTX]_set_msg_callback().Bodo Möller2001-10-201-0/+12
* Wrong place...Richard Levitte2001-10-171-1/+1
* The EVP_*Init_ex() functions take one extra argument. Let's defaultRichard Levitte2001-10-171-1/+1
* Modify EVP cipher behaviour in a similar wayDr. Stephen Henson2001-10-171-2/+2
* Retain compatibility of EVP_DigestInit() and EVP_DigestFinal()Dr. Stephen Henson2001-10-161-4/+4
* Change ssl3_get_message and the functions using it so that completeBodo Möller2001-10-151-4/+4
* the previous commit accidentily removed 'ret = 1' from the SSL_ST_OKBodo Möller2001-10-151-0/+1
* To avoid commit wars over dependencies, let's make it so things thatRichard Levitte2001-10-101-2/+0
* Disable session related stuff in SSL_ST_OK case of ssl3_accept if weBodo Möller2001-09-211-16/+17
* Bugfix: correct cleanup after sending a HelloRequestBodo Möller2001-09-211-3/+1
* New function SSL_renegotiate_pending().Bodo Möller2001-09-201-2/+17
* fix ssl3_accept: don't call ssl_init_wbio_buffer() in HelloRequest caseBodo Möller2001-09-201-5/+60
* add commentBodo Möller2001-09-141-0/+2
* Make maximum certifcate chain size accepted from the peer applicationLutz Jänicke2001-09-111-10/+2
* Rename recently introduced functions for improved code clarity:Bodo Möller2001-09-031-1/+1
* Changes crypto/evp/ and ssl/ code from directly incrementing referenceGeoff Thorpe2001-08-251-1/+1
* Allow client certificate lists > 16kB ("Douglas E. Engert" <deengert@anl.gov>.)Lutz Jänicke2001-08-251-1/+5
* More Kerberos SSL changes from Jeffrey Altman <jaltman@columbia.edu>Richard Levitte2001-07-311-1/+15
* Really add the EVP and all of the DES changes.Ben Laurie2001-07-301-1/+4
* add a commentBodo Möller2001-07-251-0/+4
* More Kerberos SSL patches from Vern Staats <staatsvr@asc.hpc.mil>.Richard Levitte2001-07-211-5/+21
* Prevent KSSL server from requesting a client certificate.Richard Levitte2001-07-121-1/+3
* Include kssl_lcl.h where needed.Richard Levitte2001-07-111-1/+1
* Patches from Vern Staats <staatsvr@asc.hpc.mil> to get Kerberos 5 inRichard Levitte2001-07-091-21/+92
* Change all calls to low level digest routines in the library andDr. Stephen Henson2001-06-191-2/+0
* Fix Bleichenbacher PKCS #1 1.5 countermeasure.Bodo Möller2001-06-011-2/+24
* Fix ERR_R_... problems.Bodo Möller2001-03-071-4/+4
* Use new-style system-id macros everywhere possible. I hope I haven'tRichard Levitte2001-02-201-23/+23
* New Option SSL_OP_CIPHER_SERVER_PREFERENCE allows TLS/SSLv3 server to overrideLutz Jänicke2001-02-091-2/+2
* Zero the premaster secret after deriving the master secret in DHDr. Stephen Henson2001-01-251-0/+1