summaryrefslogtreecommitdiff
path: root/src/lib/libssl/s23_clnt.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Merge the client/server version negotiation into the existing (currentlyjsing2017-01-261-452/+0
* Limit enabled version range by the versions configured on the SSL_CTX/SSL,jsing2017-01-251-3/+2
* Move options and mode from SSL_CTX and SSL to internal, since these can bejsing2017-01-231-4/+4
* Split most of SSL_METHOD out into an internal variant, which is opaque.jsing2017-01-231-2/+2
* send state and rstate from ssl_st into internal. There are accessorsbeck2017-01-231-13/+13
* Move a large part of ssl_st into internal, so we can see what squeals.beck2017-01-231-18/+18
* move the callbacks from ssl_st to internalbeck2017-01-231-14/+14
* Move callback function pointers and argument pointers from SSL_CTX tojsing2017-01-231-5/+5
* Move the stats struct from SSL_CTX to internal.jsing2017-01-231-2/+2
* Pull out, rework and dedup the code that determines the highest sharedjsing2017-01-031-2/+2
* Pull out (and largely rewrite) the code that determines the enabledjsing2016-12-301-38/+9
* Convert ssl_cipher_list_to_bytes() to CBB, changing the function to returnjsing2016-12-041-7/+9
* Rename functions that moved to t1_enc.c, with a tls1_ prefix instead of ajsing2015-09-111-3/+3
* Put the *client_method* data structures and functions in the same place.jsing2015-09-111-58/+1
* Fewer magic numbers - we already have defines for the header lengths, sojsing2015-09-021-5/+7
* Remove the ssl_prepare_{client,server}hello_tlsext() functions, which arejsing2015-09-011-6/+1
* Now that SSLv3 is going away, TLS_* and SSLv23 are equivalent.doug2015-08-291-60/+2
* Remove SSLv3 support from LibreSSL.doug2015-08-271-15/+3
* Fix symbol collision with libtls.doug2015-07-191-6/+6
* Add TLS_method, TLS_client_method and TLS_server_method.doug2015-07-191-1/+65
* Nuke the OPENSSL_MAX_TLS1_2_CIPHER_LENGTH hack - this has to be enabled atjsing2015-03-311-11/+1
* Factor out the init_buf initialisation code, rather than duplicating itjsing2015-03-271-17/+6
* Bring back the horrible API that is get_cipher_by_char/put_cipher_by_char.jsing2015-02-061-1/+3
* ssl3_init_finished_mac() calls BIO_new() which can fail since it in turnjsing2014-12-101-2/+5
* Sort and group includes.jsing2014-11-161-2/+4
* Use arc4random_buf() instead of RAND_bytes() or RAND_pseudo_bytes().jsing2014-10-181-4/+2
* Since we no longer need to support SSLv2-style cipher lists, startjsing2014-08-101-5/+2
* No need to keep ssl23_foo() flavours mapping to ssl3_foo().miod2014-07-111-4/+4
* decompress libssl. ok beck jsingtedu2014-07-101-19/+2
* tags as requested by miod and teduderaadt2014-06-121-1/+1
* Disable TLS support...jsing2014-06-111-4/+0
* http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2016265dfbab162ec...deraadt2014-06-071-26/+1
* TLS would not be entirely functional without extensions, so unifdefjsing2014-05-311-2/+0
* remove some #if 0 code. we don't need any more reminders that we're usingtedu2014-05-301-7/+0
* DeIMPLEMENT libssl. Expand the IMPLEMENT_* macros since it is far morejsing2014-05-241-3/+39
* More KNF.jsing2014-04-191-7/+7
* More KNF and style consistency tweaksguenther2014-04-191-7/+6
* remove some code that is now unused after guenther's changes in 1.20.jsg2014-04-171-16/+1
* Kill the bogus "send an SSLv3/TLS hello in SSLv2 format" crap fromguenther2014-04-161-174/+109
* remove ssl2 support even more completely.tedu2014-04-151-79/+1
* remove FIPS mode support. people who require FIPS can buy something thattedu2014-04-151-16/+1
* So the OpenSSL codebase does "get the time, add it as a random seed"deraadt2014-04-141-2/+0
* First pass at applying KNF to the OpenSSL code, which almost makes itjsing2014-04-141-330/+290
* Do not include "e_os.h" anymore. Simply pull in the necessary headers.mpi2014-04-131-1/+1
* Merge conflicts; remove MacOS, Netware, OS/2, VMS and Windows build machinery.miod2014-04-131-4/+25
* resolve conflictsdjm2012-10-131-14/+97
* resolve conflicts, fix local changesdjm2010-10-011-70/+151
* update to openssl-0.9.8i; tested by several, especially krw@djm2009-01-051-0/+16
* resolve conflictsdjm2008-09-061-40/+23
* resolve conflictsdjm2006-06-271-59/+166