summaryrefslogtreecommitdiff
path: root/src/lib/libssl/s3_both.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Rename s3_{both,clnt,pkt_srvr}.c to have an ssl_ prefix since they are nojsing2017-01-261-748/+0
* Merge the client/server version negotiation into the existing (currentlyjsing2017-01-261-6/+12
* Move options and mode from SSL_CTX and SSL to internal, since these can bejsing2017-01-231-3/+3
* Split most of SSL_METHOD out into an internal variant, which is opaque.jsing2017-01-231-12/+12
* send state and rstate from ssl_st into internal. There are accessorsbeck2017-01-231-8/+8
* Move a large part of ssl_st into internal, so we can see what squeals.beck2017-01-231-43/+43
* move the callbacks from ssl_st to internalbeck2017-01-231-10/+10
* Move most of the SSL3_STATE fields to internal - the ones that remain arejsing2017-01-221-32/+32
* Remove now unused c2l, c2ln, l2c, n2l, l2cn and n2l3 macros.jsing2016-12-301-2/+1
* Convert certificate handshake message generation to CBB, with some cleanjsing2016-12-061-45/+45
* Move handshake message header length determination into a separatejsing2015-09-121-6/+7
* Rename functions that moved to t1_enc.c, with a tls1_ prefix instead of ajsing2015-09-111-3/+3
* Shuffle the code in ssl3_send_finished() to make it more logical/readable.jsing2015-09-111-9/+7
* style(9), fix comments, wrap long lines and tweak whitespace.jsing2015-09-111-31/+59
* Convert dtls1_send_finished() and ssl3_send_finished() tojsing2015-09-111-10/+5
* Remove SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER workaround.doug2015-07-181-5/+1
* test for n<0 before use in CBS_init - mostly to shut up coverity.beck2015-07-151-2/+8
* Partially convert ssl3_get_message to CBS.doug2015-07-141-6/+15
* Convert ssl3_get_finished to CBS.doug2015-07-141-6/+9
* Remove Microsoft Server Gated Crypto.doug2015-06-181-15/+1
* Factor out the init_buf initialisation code, rather than duplicating itjsing2015-03-271-3/+22
* unconditionally align SSL payloadsbcook2014-12-141-9/+5
* Remove trailing whitespace.jsing2014-12-141-9/+9
* unifdef OPENSSL_NO_NEXTPROTONEG, which is one of the last standing #ifndefjsing2014-12-141-10/+1
* ssl3_init_finished_mac() calls BIO_new() which can fail since it in turnjsing2014-12-101-2/+6
* Remove support for GOST R 34.10-94 signature authentication, along withjsing2014-12-101-4/+1
* Sort and group includes.jsing2014-11-161-3/+5
* Use arc4random_buf() instead of RAND_bytes() or RAND_pseudo_bytes().jsing2014-10-181-2/+1
* Also check the result from final_finish_mac() against finish_mac_length injsing2014-09-221-19/+17
* It is possible (although unlikely in practice) for peer_finish_md_len tojsing2014-09-221-13/+11
* Oops, revert changes commited by mistake. The previous commit was supposedmiod2014-08-071-9/+12
* When you expect a function to return a particular value, don't put a commentmiod2014-08-071-12/+9
* decompress libssl. ok beck jsingtedu2014-07-101-10/+1
* convert CRYPTO_memcmp to timingsafe_memcmp based on current policy favoringtedu2014-06-191-2/+2
* tags as requested by miod and teduderaadt2014-06-121-1/+1
* BUF_MEM_grow_clean() takes a size_t as the size argument. Remove false commentsmiod2014-05-311-8/+2
* ECDH and ECDSA will not work overly well if there is no EC, so unifdefjsing2014-05-311-2/+0
* Make use of SSL_IS_DTLS, SSL_USE_EXPLICIT_IV, SSL_USE_SIGALGS andjsing2014-05-301-2/+2
* There is no point in checking if a pointer is non-NULL before calling free,jsing2014-05-281-8/+4
* Fix indentation, adding braces and combining a nested if to reduce depthguenther2014-04-201-12/+14
* Change library to use intrinsic memory allocation functions instead ofbeck2014-04-171-4/+4
* TANSTAAFL - delete the buf freelist code. if you need a better malloc, gettedu2014-04-161-74/+4
* First pass at applying KNF to the OpenSSL code, which almost makes itjsing2014-04-141-354/+314
* Flense a variety of windows support stuff, and a strange gettimeofday function.beck2014-04-131-7/+0
* Merge conflicts; remove MacOS, Netware, OS/2, VMS and Windows build machinery.miod2014-04-131-6/+9
* SECURITY fixes backported from openssl-1.0.1f. ok mikeb@jca2014-02-271-0/+7
* cherry pick bugfixes for http://www.openssl.org/news/secadv_20130205.txtmarkus2013-02-141-1/+1
* resolve conflictsdjm2012-10-131-3/+33
* resolve conflicts, fix local changesdjm2010-10-011-62/+253
* resolve conflictsdjm2008-09-061-27/+14