summaryrefslogtreecommitdiff
path: root/src/lib/libssl/s3_both.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* BUF_MEM_grow_clean() takes a size_t as the size argument. Remove false commentsmiod2014-05-311-8/+2
| | | | | | | mentioning it's an int, bogus (int) casts and bounds checks against INT_MAX (BUF_MEM_grow_clean has its own integer bounds checks). ok deraadt@
* ECDH and ECDSA will not work overly well if there is no EC, so unifdefjsing2014-05-311-2/+0
| | | | | | OPENSSL_NO_EC. ok tedu@
* Make use of SSL_IS_DTLS, SSL_USE_EXPLICIT_IV, SSL_USE_SIGALGS andjsing2014-05-301-2/+2
| | | | | | SSL_USE_TLS1_2_CIPHERS. Largely based on OpenSSL head.
* There is no point in checking if a pointer is non-NULL before calling free,jsing2014-05-281-8/+4
| | | | | | | | since free already does this for us. Also remove some pointless NULL assignments, where the result from malloc(3) is immediately assigned to the same variable. ok miod@
* Fix indentation, adding braces and combining a nested if to reduce depthguenther2014-04-201-12/+14
|
* Change library to use intrinsic memory allocation functions instead ofbeck2014-04-171-4/+4
| | | | | | | | OPENSSL_foo wrappers. This changes: OPENSSL_malloc->malloc OPENSSL_free->free OPENSSL_relloc->realloc OPENSSL_freeFunc->free
* TANSTAAFL - delete the buf freelist code. if you need a better malloc, gettedu2014-04-161-74/+4
| | | | a better malloc. ok beck deraadt
* First pass at applying KNF to the OpenSSL code, which almost makes itjsing2014-04-141-354/+314
| | | | | readable. This pass is whitespace only and can readily be verified using tr and md5.
* Flense a variety of windows support stuff, and a strange gettimeofday function.beck2014-04-131-7/+0
| | | | ok deraadt@
* Merge conflicts; remove MacOS, Netware, OS/2, VMS and Windows build machinery.miod2014-04-131-6/+9
|
* SECURITY fixes backported from openssl-1.0.1f. ok mikeb@jca2014-02-271-0/+7
| | | | | | | | | | | | CVE-2013-4353 NULL pointer dereference with crafted Next Protocol Negotiation record in TLS handshake. Upstream: 197e0ea CVE-2013-6449 Fix crash with crafted traffic from a TLS 1.2 client. Upstream: ca98926, 0294b2b CVE-2013-6450 Fix DTLS retransmission from previous session. Upstream: 3462896
* cherry pick bugfixes for http://www.openssl.org/news/secadv_20130205.txtmarkus2013-02-141-1/+1
| | | | | from the openssl git (changes between openssl 1.0.1c and 1.0.1d). ok djm@
* resolve conflictsdjm2012-10-131-3/+33
|
* resolve conflicts, fix local changesdjm2010-10-011-62/+253
|
* resolve conflictsdjm2008-09-061-27/+14
|
* merge 0.9.7b with local changes; crank majors for libssl/libcryptomarkus2003-05-121-7/+18
|
* merge openssl-0.9.7-beta3, tested on vax by miod@markus2002-09-101-1/+1
|
* OpenSSL 0.9.7 stable 2002 05 08 mergebeck2002-05-151-19/+55
|
* openssl-engine-0.9.6a mergebeck2001-06-221-2/+2
|
* openssl-engine-0.9.6 mergebeck2000-12-151-2/+2
|
* OpenSSL 0.9.5 mergebeck2000-03-191-22/+142
| | | | | | *warning* this bumps shared lib minors for libssl and libcrypto from 2.1 to 2.2 if you are using the ssl26 packages for ssh and other things to work you will need to get new ones (see ~beck/libsslsnap/<arch>) on cvs or ~beck/src-patent.tar.gz on cvs
* OpenSSL 0.9.4 mergebeck1999-09-291-43/+42
|
* Import of SSLeay-0.9.0b with RSA and IDEA stubbed + OpenBSD buildryker1998-10-051-0/+469
functionality for shared libs. Note that routines such as sslv2_init and friends that use RSA will not work due to lack of RSA in this library. Needs documentation and help from ports for easy upgrade to full functionality where legally possible.