1. 14 3月, 2020 1 次提交
    • B
      Additional updates to SSL_CTX_sess_set_get_cb.pod · d3133cc7
      Benjamin Kaduk 提交于
      Generally modernize the language.
      
      Refer to TLS instead of SSL/TLS, and try to have more consistent
      usage of commas and that/which.
      
      Reword some descriptions to avoid implying that a list of potential
      reasons for behavior is an exhaustive list.
      
      Clarify how get_session_cb() is only called on servers (i.e., in general,
      and that it's given the session ID proposed by the client).
      
      Clarify the semantics of the get_cb()'s "copy" argument.
      The behavior seems to have changed in commit
      8876bc05, though the behavior prior
      to that commit was not to leave the reference-count unchanged if
      *copy was not written to -- instead, libssl seemed to assume that the
      callback already had incremented the reference count.
      Reviewed-by: NTomas Mraz <tmraz@fedoraproject.org>
      (Merged from https://github.com/openssl/openssl/pull/10943)
      
      (cherry picked from commit 06f876837a8ec76b28c42953731a156c0c3700e2)
      d3133cc7
  2. 17 1月, 2020 1 次提交
  3. 21 6月, 2018 1 次提交
  4. 17 1月, 2018 2 次提交
  5. 08 6月, 2017 1 次提交
  6. 26 4月, 2017 3 次提交
  7. 11 11月, 2016 1 次提交
  8. 27 10月, 2016 1 次提交
  9. 21 5月, 2016 1 次提交
  10. 20 5月, 2016 1 次提交
  11. 19 5月, 2016 1 次提交
  12. 01 2月, 2016 1 次提交
  13. 22 8月, 2015 1 次提交
  14. 28 3月, 2003 1 次提交
  15. 11 7月, 2002 1 次提交
  16. 12 10月, 2001 1 次提交
    • L
      Update information as a partial response to the post · 56fa8e69
      Lutz Jänicke 提交于
        From: "Chris D. Peterson" <cpeterson@aventail.com>
        Subject: Implementation Issues with OpenSSL
        To: openssl-users@openssl.org
        Date: Wed, 22 Aug 2001 16:13:17 -0700
      The patch included in the original post may improve the internal session
      list handling (and is therefore worth a seperate investigation).
      No change to the list handling will however solve the problems of incorrect
      SSL_SESSION_free() calls. The session list is only one possible point of
      failure, dangling pointers would also occur for SSL object currently
      using the session. The correct solution is to only use SSL_SESSION_free()
      when applicable!
      56fa8e69
  17. 05 2月, 2001 1 次提交
  18. 02 2月, 2001 1 次提交