summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_sess.c (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Expand IMPLEMENT_PEM macros.jsing2016-09-041-2/+29
* X509_free(3) is NULL-safe, so remove NULL checks before its calls.mmcc2016-03-111-3/+2
* Remove support for DTLS_BAD_VER. We do not support non-standard andjsing2015-09-101-2/+1
* Correct spelling of OPENSSL_cleanse.jsing2015-09-101-4/+4
* Remove SSLv3 support from LibreSSL.doug2015-08-271-2/+1
* Remove duplicate check in libssl.doug2015-07-211-3/+1
* Remove trailing whitespace.jsing2014-12-141-8/+8
* Clean up more SSLv2 remnants.jsing2014-11-081-10/+9
* Use arc4random_buf() instead of RAND_bytes() or RAND_pseudo_bytes().jsing2014-10-181-4/+2
* Refactor and simplify the ECC extension handling. The existing codejsing2014-09-221-21/+1
* Provide a ssl3_get_cipher_by_id() function that allows ciphers to be lookedjsing2014-08-111-13/+2
* Since we no longer need to support SSLv2-style cipher lists, startjsing2014-08-101-3/+3
* The bell tolls for BUF_strdup - Start the migration to usingbeck2014-07-131-2/+2
* Apply a large dose of KNF.jsing2014-07-121-126/+202
* Remove the PSK code. We don't need to drag around thisbeck2014-07-111-9/+1
* decompress libssl. ok beck jsingtedu2014-07-101-3/+2
* always compare memcmp against 0, for clarity.tedu2014-06-211-2/+2
* convert CRYPTO_memcmp to timingsafe_memcmp based on current policy favoringtedu2014-06-191-2/+2
* tags as requested by miod and teduderaadt2014-06-121-1/+1
* without overthinking it, replace a few memcmp calls with CRYPTO_memcmptedu2014-06-041-1/+1
* ECDH and ECDSA will not work overly well if there is no EC, so unifdefjsing2014-05-311-6/+0
* TLS would not be entirely functional without extensions, so unifdefjsing2014-05-311-16/+0
* There is no point in checking if a pointer is non-NULL before calling free,jsing2014-05-281-21/+9
* Remove SRP and Kerberos support from libssl. These are complex protocolstedu2014-05-051-16/+0
* whitespacetedu2014-04-231-2/+2
* more malloc/realloc/calloc cleanups; ok beck kettenisderaadt2014-04-211-3/+2
* Chop off more SSLv2 tentacles and start fixing and noting y2038 issues.guenther2014-04-201-4/+6
* More KNF and style consistency tweaksguenther2014-04-191-12/+12
* kill REF_PRINT/REF_CHECK debugging framework noone would usederaadt2014-04-171-9/+0
* Change library to use intrinsic memory allocation functions instead ofbeck2014-04-171-16/+16
* add back SRP. i was being too greedy.tedu2014-04-161-0/+7
* disentangle SRP code from TLStedu2014-04-161-7/+0
* Kill the bogus "send an SSLv3/TLS hello in SSLv2 format" crap fromguenther2014-04-161-27/+13
* First pass at applying KNF to the OpenSSL code, which almost makes itjsing2014-04-141-555/+539
* resolve conflictsdjm2012-10-131-48/+112
* resolve conflicts, fix local changesdjm2010-10-011-32/+221
* update to openssl-0.9.8i; tested by several, especially krw@djm2009-01-051-0/+22
* resolve conflictsdjm2008-09-061-30/+159
* resolve conflictsdjm2006-06-271-2/+2
* resolve conflictsdjm2005-04-291-6/+7
* merge 0.9.7c; minor bugsfixes;markus2003-11-111-2/+2
* merge 0.9.7b with local changes; crank majors for libssl/libcryptomarkus2003-05-121-7/+10
* merge with openssl-0.9.7-stable-SNAP-20020911,markus2002-09-141-1/+6
* apply patches from OpenSSL Security Advisory [30 July 2002],markus2002-07-301-0/+1
* OpenSSL 0.9.7 stable 2002 05 08 mergebeck2002-05-151-29/+93
* openssl-engine-0.9.6a mergebeck2001-06-221-0/+1
* openssl-engine-0.9.6 mergebeck2000-12-151-3/+3
* OpenSSL 0.9.5 mergebeck2000-03-191-23/+66
* OpenSSL 0.9.4 mergebeck1999-09-291-101/+156
* Import of SSLeay-0.9.0b with RSA and IDEA stubbed + OpenBSD buildryker1998-10-051-0/+582