summaryrefslogtreecommitdiff
path: root/src/lib/libssl/s3_clnt.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Nuke the OPENSSL_MAX_TLS1_2_CIPHER_LENGTH hack - this has to be enabled atjsing2015-03-311-11/+1
* Factor out the init_buf initialisation code, rather than duplicating itjsing2015-03-271-19/+6
* delay EVP_MD_CTX_init so we don't forget to clean it up.tedu2015-03-111-3/+4
* Reject DH keys sent by a server if they are considered too small; inspiredmiod2015-03-081-1/+12
* Clean up the {get,put}_cipher_by_char() implementations. Also usejsing2015-02-071-7/+5
* Add additional checks to ssl3_send_client_key_exchange() that ensuresjsing2015-02-061-18/+25
* Bring back the horrible API that is get_cipher_by_char/put_cipher_by_char.jsing2015-02-061-1/+3
* Ensure that a ServerKeyExchange message is received if the selected cipherjsing2015-01-231-5/+18
* Add error handling for EVP_DigestInit_ex().doug2014-12-151-4/+8
* Convert all of the straight forward client handshake handling code to usejsing2014-12-141-53/+43
* Remove trailing whitespace.jsing2014-12-141-2/+2
* unifdef OPENSSL_NO_NEXTPROTONEG, which is one of the last standing #ifndefjsing2014-12-141-9/+1
* ssl3_init_finished_mac() calls BIO_new() which can fail since it in turnjsing2014-12-101-2/+5
* Remove support for GOST R 34.10-94 signature authentication, along withjsing2014-12-101-3/+1
* Remove client handling of RSA in ServerKeyExchange messages, along withjsing2014-12-061-81/+14
* Ensure that sess_cert is not NULL at the start ofjsing2014-11-271-25/+9
* Fix a memory leak with pkey in client key exchangedoug2014-11-191-1/+2
* Update the GOST code in libssl, as contributed by Dmitry Eremin-Solenikov.miod2014-11-181-20/+51
* Sort and group includes.jsing2014-11-161-4/+7
* Use arc4random_buf() instead of RAND_bytes() or RAND_pseudo_bytes().jsing2014-10-181-7/+4
* Check that the specified curve is one of the client preferences.jsing2014-09-271-4/+20
* remove obfuscating parens. man operator is your friend.tedu2014-09-191-6/+6
* Remove SSL_kDHr, SSL_kDHd and SSL_aDH. No supported ciphersuites use them,jsing2014-09-071-16/+3
* Replace the remaining ssl3_get_cipher_by_char() calls with n2s() andjsing2014-08-231-7/+15
* Currently, ssl3_put_char_by_bytes(NULL, NULL) is just a long handed wayjsing2014-08-111-2/+2
* Since we no longer need to support SSLv2-style cipher lists, startjsing2014-08-101-7/+5
* merge CVE-2014-3510; Fix DTLS anonymous EC(DH) denial of servicederaadt2014-08-071-1/+9
* Missing bounds check in ssl3_get_certificate_request(), was not spotted inmiod2014-07-171-1/+6
* The correct name for EDH is DHE, likewise EECDH should be ECDHE.jsing2014-07-121-6/+6
* remove double brackets. fixes build with clang.jsg2014-07-121-2/+2
* Remove extra parenthesis.jsing2014-07-121-2/+2
* need_cert is now always true, so remove the variable and associatedjsing2014-07-121-33/+21
* Remove remnants from PSK, KRB5 and SRP.jsing2014-07-121-18/+7
* As reported by David Ramos, most consumer of ssl_get_message() perform latemiod2014-07-111-11/+74
* If the application uses tls_session_secret_cb for session resumption, setmiod2014-07-111-2/+3
* Accept CCS again after `finished' has been sent by the client; at this pointmiod2014-07-111-5/+6
* Remove the PSK code. We don't need to drag around thisbeck2014-07-111-136/+1
* decompress libssl. ok beck jsingtedu2014-07-101-70/+2
* tedu the SSL export cipher handling - since we do not have enabled exportjsing2014-07-091-31/+1
* always compare memcmp against 0, for clarity.tedu2014-06-211-2/+2
* convert CRYPTO_memcmp to timingsafe_memcmp based on current policy favoringtedu2014-06-191-3/+3
* tags as requested by miod and teduderaadt2014-06-121-1/+1
* Stop setting the EVP_MD_CTX_FLAG_NON_FIPS_ALLOW - it has been ignored sincejsing2014-06-111-2/+0
* http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2016265dfbab162ec...deraadt2014-06-071-3/+1
* The DH_free, EC_KEY_free, EVP_PKEY_free and RSA_free functions all havejsing2014-06-071-13/+8
* Ensure that sess_cert is not NULL before trying to use it.jsing2014-06-051-0/+8
* ssl_sess_cert_new() can return NULL. Fix two cases where the return valuejsing2014-06-051-13/+12
* Be selective as to when ChangeCipherSpec messages will be accepted.jsing2014-06-051-1/+2
* More KNF.jsing2014-06-051-49/+32
* without overthinking it, replace a few memcmp calls with CRYPTO_memcmptedu2014-06-041-2/+2