Skip to content
  1. Oct 16, 2001
    • Bodo Möller's avatar
      Add per-SSL 'msg_callback' with 'msg_callback_arg'. · bf21446a
      Bodo Möller authored
      Both have per-SSL_CTX defaults.
      These new values can be set by calling SSL[_CTX]_[callback_]ctrl
      with codes SSL_CTRL_SET_MSG_CALLBACK and SSL_CTRL_SET_MSG_CALLBACK_ARG.
      
      So far, the callback is never actually called.
      
      
      Also rearrange some SSL_CTX struct members (some exist just in
      SSL_CTXs, others are defaults for SSLs and are either copied
      during SSL_new, or used if the value in the SSL is not set;
      these three classes of members were not in a logical order),
      and add some missing assignments to SSL_dup.
      bf21446a
    • Dr. Stephen Henson's avatar
      Update docs. · e72d734d
      Dr. Stephen Henson authored
      e72d734d
    • Dr. Stephen Henson's avatar
      · 20d2186c
      Dr. Stephen Henson authored
      Retain compatibility of EVP_DigestInit() and EVP_DigestFinal()
      with existing code.
      
      Modify library to use digest *_ex() functions.
      20d2186c
    • Bodo Möller's avatar
      The message header for fake SSL 3.0/TLS 1.0 client hellos created from · 9ba3ec91
      Bodo Möller authored
      SSL 2.0 client hellos added with the previous commit was totally wrong --
      it must start with the message type, not the protocol version.
      (Not that this particular header is actually used anywhere ...)
      9ba3ec91
  2. Oct 15, 2001
  3. Oct 14, 2001
  4. Oct 12, 2001
    • Lutz Jänicke's avatar
      Update information as a partial response to the post · 56fa8e69
      Lutz Jänicke authored
        From: "Chris D. Peterson" <cpeterson@aventail.com>
        Subject: Implementation Issues with OpenSSL
        To: openssl-users@openssl.org
        Date: Wed, 22 Aug 2001 16:13:17 -0700
      The patch included in the original post may improve the internal session
      list handling (and is therefore worth a seperate investigation).
      No change to the list handling will however solve the problems of incorrect
      SSL_SESSION_free() calls. The session list is only one possible point of
      failure, dangling pointers would also occur for SSL object currently
      using the session. The correct solution is to only use SSL_SESSION_free()
      when applicable!
      56fa8e69
  5. Oct 11, 2001
  6. Oct 10, 2001
  7. Oct 09, 2001
  8. Oct 08, 2001
  9. Oct 04, 2001
  10. Oct 03, 2001
  11. Oct 02, 2001