The data contained in this repository can be downloaded to your computer using one of several clients.
Please see the documentation of your version control software client for more information.

Please select the desired protocol below to get the URL.

This URL has Read-Only access.

Statistics
| Branch: | Revision:

main_repo / deps / openssl / openssl / ssl @ aa3b4b4d

Name Size
Makefile 64 KB
bio_ssl.c 13.9 KB
d1_both.c 44.5 KB
d1_clnt.c 44.4 KB
d1_enc.c 9.15 KB
d1_lib.c 12.4 KB
d1_meth.c 3.06 KB
d1_pkt.c 51.4 KB
d1_srtp.c 13.1 KB
d1_srvr.c 44.2 KB
dtls1.h 7.84 KB
heartbeat_test.c 13.3 KB
install-ssl.com 3.23 KB
kssl.c 68 KB
kssl.h 6.14 KB
kssl_lcl.h 3.36 KB
s23_clnt.c 21.4 KB
s23_lib.c 5.47 KB
s23_meth.c 3.78 KB
s23_pkt.c 4.09 KB
s23_srvr.c 18.5 KB
s2_clnt.c 30.1 KB
s2_enc.c 6.12 KB
s2_lib.c 13.1 KB
s2_meth.c 3.56 KB
s2_pkt.c 19.7 KB
s2_srvr.c 31.5 KB
s3_both.c 23.5 KB
s3_cbc.c 27.6 KB
s3_clnt.c 84.3 KB
s3_enc.c 26.1 KB
s3_lib.c 81.3 KB
s3_meth.c 3.46 KB
s3_pkt.c 43.1 KB
s3_srvr.c 89.7 KB
srtp.h 6.49 KB
ssl-lib.com 26.4 KB
ssl.h 102 KB
ssl2.h 10.5 KB
ssl23.h 3.66 KB
ssl3.h 26.5 KB
ssl_algs.c 5.58 KB
ssl_asn1.c 19.6 KB
ssl_cert.c 21.6 KB
ssl_ciph.c 51.3 KB
ssl_err.c 38.8 KB
ssl_err2.c 3.31 KB
ssl_lib.c 81.3 KB
ssl_locl.h 42 KB
ssl_rsa.c 17.7 KB
ssl_sess.c 33.3 KB
ssl_stat.c 23.9 KB
ssl_task.c 12.4 KB
ssl_txt.c 8.5 KB
ssl_utst.c 2.82 KB
ssltest.c 63.3 KB
t1_clnt.c 3.96 KB
t1_enc.c 36.4 KB
t1_lib.c 73.9 KB
t1_meth.c 3.73 KB
t1_reneg.c 10.8 KB
t1_srvr.c 3.99 KB
tls1.h 34.5 KB
tls_srp.c 14.2 KB

Latest revisions

# Date Author Comment
aa3b4b4d 08/07/2014 05:36 AM Fedor Indutny

deps: update openssl to v1.0.1i

a7dd0e51 06/05/2014 10:11 AM Fedor Indutny

deps: update openssl to 1.0.1h

d6fd1187 04/07/2014 04:58 PM Fedor Indutny

deps: update openssl to 1.0.1g

2cf7e5de 05/01/2013 10:45 AM Ben Noordhuis

Revert "deps: downgrade openssl to v1.0.0f"

After much investigation it turns out that the affected servers are
buggy. user-service.condenastdigital.com:443 in particular seems to
reject large TLS handshake records. Cutting down the number of
advertised ciphers or disabling SNI fixes the issue....

4fdb8acd 04/29/2013 06:12 AM Ben Noordhuis

deps: downgrade openssl to v1.0.0f

Several people have reported issues with IIS and Resin servers (or maybe
SSL terminators sitting in front of those servers) that are fixed by
downgrading OpenSSL. The AESNI performance improvements were nice but
stability is more important. Downgrade OpenSSL from 1.0.1e to 1.0.0f....

f317f5ae 02/20/2013 07:48 AM Fedor Indutny

openssl: update to 1.0.1e

1d9b4ace 09/11/2012 11:23 PM Bert Belder

openssl: support handshake cut-through

Enables SSL3+ clients to send application data immediately following the
Finished message even when negotiating full-handshakes. With this patch,
clients can negotiate SSL connections in 1-RTT even when performing
full-handshakes....

ff22a0cb 09/11/2012 11:23 PM Bert Belder

openssl: reduce memory consumption

SSL records may be as large as 16K, but are typically < 2K. In
addition, a historic bug in Windows allowed records to be as large
32K. OpenSSL statically allocates read and write buffers (34K and
18K respectively) used for processing records....

b61ae54e 09/11/2012 06:40 PM Bert Belder

openssl: upgrade to vanilla openssl 1.0.1c

c945eae9 04/14/2012 06:05 PM Ben Noordhuis

deps: fix -DOPENSSL_NO_SOCK on sunos

The OPENSSL_NO_SOCK macro in OpenSSL missed a couple of networking functions
that called other functions that OPENSSL_NO_SOCK had filtered out. None of
the functions (filtered or not) were actually used but it was enough to trip...

View revisions

Also available in: Atom