summaryrefslogtreecommitdiff
path: root/src/lib/libssl/s3_lib.c (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Bring in an SSL_HANDSHAKE structure and commence the great shovellingbeck2017-05-061-3/+3
* Provide SSL{,_CTX}_set_{min,max}_proto_version() functions.jsing2017-05-061-1/+21
* Use freezero() for the internal opaque structures, instead of the currentjsing2017-04-101-6/+3
* Use freezero() for X25519 keys - same result with more readable code.jsing2017-04-101-7/+3
* Remove the handshake digests and related code, replacing remaining usesjsing2017-03-101-3/+1
* Provide a rolling handshake hash that commences as soon as the cipherjsing2017-03-051-1/+6
* Drop the second argument of dtls1_set_message_header() and make it a voidjsing2017-03-041-3/+3
* Change SSLerror() back to taking two args, with the first one being an SSL *.beck2017-02-071-24/+24
* Define values for SSL_CTRL_SET_GROUPS{,_LIST} and wire them up to thejsing2017-02-051-1/+13
* Finish the fallout of the SSLerr->SSLerror cleanup to get rid of the uglybeck2017-01-261-35/+18
* Send the error function codes to rot in the depths of hell where they belongbeck2017-01-261-24/+24
* sk_pop_free() checks for NULL so do not bother doing it from the callers.jsing2017-01-241-9/+5
* Add support for setting the supported EC curves viajsing2017-01-241-1/+30
* There is no point returning then breaking...jsing2017-01-241-2/+1
* Move options and mode from SSL_CTX and SSL to internal, since these can bejsing2017-01-231-4/+4
* Split most of SSL_METHOD out into an internal variant, which is opaque.jsing2017-01-231-8/+8
* send state and rstate from ssl_st into internal. There are accessorsbeck2017-01-231-4/+4
* Move a large part of ssl_st into internal, so we can see what squeals.beck2017-01-231-31/+31
* Move most of the fields in SSL_CTX to internal - the ones that remain arejsing2017-01-231-11/+11
* move the callbacks from ssl_st to internalbeck2017-01-231-7/+7
* Move callback function pointers and argument pointers from SSL_CTX tojsing2017-01-231-6/+6
* Move not_resumable and sess_cert from SSL_SESSION to internal.jsing2017-01-231-3/+3
* Move most of the SSL3_STATE fields to internal - the ones that remain arejsing2017-01-221-52/+58
* Move ALPN and NPN fields from SSL/SSL_CTX to internal.jsing2017-01-221-4/+4
* Convert publically visible structs to translucent structs.jsing2017-01-221-3/+15
* Clean up ssl3_new() - in particular, we do not need to zero fields thatjsing2017-01-221-11/+4
* There is no point in setting struct fields to zero, when you've alreadyjsing2017-01-221-5/+2
* Add support for SSL_get_server_tmp_key().jsing2016-12-301-1/+67
* Add support for ECDHE with X25519.jsing2016-12-211-1/+11
* Convert certificate handshake message generation to CBB, with some cleanjsing2016-12-061-1/+72
* Adjust cipher suite strengths - move MD5 to LOW, RC4 to LOW and 3DES tojsing2016-11-061-13/+13
* Remove the single IDEA cipher suite. There is no good reason to supportjsing2016-11-061-19/+1
* unifdef -m -UOPENSSL_NO_CHACHA -UOPENSSL_NO_POLY1305jsing2016-11-061-3/+1
* Remove support for fixed ECDH cipher suites - these is not widely supportedjsing2016-10-191-303/+3
* Implement the IETF ChaCha20-Poly1305 cipher suites.jsing2016-04-281-6/+57
* deprecate SSL_OP_SINGLE_DH_USElibressl-v2.3.2beck2016-01-271-17/+1
* Remove most of the SSLv3 version checks and a few TLS v1.0.doug2015-09-121-10/+5
* Move handshake message header length determination into a separatejsing2015-09-121-11/+10
* Rename functions that moved to t1_enc.c, with a tls1_ prefix instead of ajsing2015-09-111-5/+5
* Nuke ssl3_default_timeout().jsing2015-09-111-11/+1
* Nuke SSLv3_enc_data.jsing2015-09-111-21/+1
* Correct spelling of OPENSSL_cleanse.jsing2015-09-101-2/+2
* Remove SSLv3 support from LibreSSL.doug2015-08-271-2/+2
* Crank major and remove legacy variables.doug2015-07-191-4/+1
* Remove compat hack that disabled ECDHE-ECDSA on OS X.doug2015-07-171-9/+1
* Convert ssl3_get_cipher_by_char to CBS.doug2015-07-141-2/+8
* Make SSL_CIPHER_get_bits() report ChaCha20-Poly1305 ciphers as usingguenther2015-05-251-4/+4
* Rely upon enc_flags rather than the tls version, to upgrade SHA1+MD5 tomiod2015-02-081-4/+4
* Clean up the {get,put}_cipher_by_char() implementations. Also usejsing2015-02-071-17/+6
* Provide a SSL_CIPHER_get_by_value() function that allows a cipher to bejsing2015-02-071-1/+8