summaryrefslogtreecommitdiff
path: root/src/lib/libssl/s3_srvr.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* This commit was manufactured by cvs2git to create tag 'OPENBSD_5_8_BASE'.OPENBSD_5_8_BASEcvs2svn2015-08-021-2778/+0
* Add linker warnings in case SSLv3_{,client,server}_method are referenced.miod2015-07-291-1/+7
* Remove support for the SSL_OP_TLS_D5_BUG compat hack from SSLeay.doug2015-07-181-8/+4
* Convert ssl3_get_client_certificate to CBS.doug2015-07-141-15/+19
* Convert ssl3_get_next_proto to CBS.doug2015-06-201-14/+19
* Remove Microsoft Server Gated Crypto.doug2015-06-181-56/+7
* KNF whitespace.doug2015-06-171-2/+3
* Remove ancient SSL_OP_NETSCAPE_CA_DN_BUG from SSLeay days.doug2015-06-151-15/+5
* Remove ancient compat hack SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG.doug2015-06-151-24/+1
* Remove 1997's compat hack SSL_OP_SSLEAY_080_CLIENT_DH_BUG.doug2015-06-151-9/+4
* Fix return paths with missing EVP_CIPHER_CTX_cleanup() calls.jsg2015-05-151-1/+2
* Clean up the ssl_bytes_to_cipher_list() API - rather than having thejsing2015-04-151-4/+4
* Factor out the init_buf initialisation code, rather than duplicating itjsing2015-03-271-15/+4
* Fix CVE-2015-0205: Do not accept client authentication with Diffie-Hellmanbcook2015-02-251-2/+2
* Convert several of the server side handshake functions to the new handshakejsing2015-02-071-57/+25
* Unifdef NETSCAPE_HANG_BUG.jsing2015-02-061-22/+1
* Bring back the horrible API that is get_cipher_by_char/put_cipher_by_char.jsing2015-02-061-1/+3
* don't leak timing info about padding errors by generating a fake keytedu2014-12-291-5/+10
* Add error handling for EVP_DigestInit_ex().doug2014-12-151-3/+4
* unifdef OPENSSL_NO_NEXTPROTONEG, which is one of the last standing #ifndefjsing2014-12-141-17/+1
* ssl3_init_finished_mac() calls BIO_new() which can fail since it in turnjsing2014-12-101-3/+10
* Remove support for GOST R 34.10-94 signature authentication, along withjsing2014-12-101-4/+2
* Update the GOST code in libssl, as contributed by Dmitry Eremin-Solenikov.miod2014-11-181-22/+56
* Sort and group includes.jsing2014-11-161-5/+7
* Add support for automatic DH ephemeral keys.jsing2014-10-311-4/+17
* Remove support for ephemeral/temporary RSA private keys.jsing2014-10-311-80/+14
* Use arc4random_buf() instead of RAND_bytes() or RAND_pseudo_bytes().jsing2014-10-181-9/+4
* Add support for automatic ephemeral EC keys.jsing2014-10-031-3/+11
* There is not much point checking ecdhp is not NULL... twice.jsing2014-09-271-8/+3
* remove obfuscating parens. man operator is your friend.tedu2014-09-191-9/+9
* Remove SSL_kDHr, SSL_kDHd and SSL_aDH. No supported ciphersuites use them,jsing2014-09-071-5/+3
* Replace the remaining uses of ssl3_put_cipher_by_char() with s2n and ajsing2014-08-241-4/+3
* Unchecked memory allocation and potential leak upon error inmiod2014-08-111-5/+12
* Since we no longer need to support SSLv2-style cipher lists, startjsing2014-08-101-3/+1
* The RSA, DH, and ECDH temporary key callbacks expect the number of keybitsguenther2014-07-281-4/+7
* The correct name for EDH is DHE, likewise EECDH should be ECDHE.jsing2014-07-121-9/+9
* Remove remnants from PSK, KRB5 and SRP.jsing2014-07-121-40/+16
* Place comments in a block above the if statement, rather than attemptingjsing2014-07-121-29/+31
* As reported by David Ramos, most consumer of ssl_get_message() perform latemiod2014-07-111-41/+65
* In ssl3_get_cert_verify(), allow for larger messages to accomodate keysmiod2014-07-111-3/+2
* In ssl3_get_client_key_exchange() parsing a GOST session key, invoke themiod2014-07-111-13/+8
* Remove the PSK code. We don't need to drag around thisbeck2014-07-111-108/+1
* remove unused variable from ssl3_get_client_hellobcook2014-07-101-3/+2
* decompress libssl. ok beck jsingtedu2014-07-101-96/+1
* KNF comments, reflowing and moving out of the middle of argument lists inguenther2014-07-101-32/+41
* tedu the SSL export cipher handling - since we do not have enabled exportjsing2014-07-091-27/+6
* fix the identical leak in three different files.tedu2014-06-301-2/+3
* convert CRYPTO_memcmp to timingsafe_memcmp based on current policy favoringtedu2014-06-191-2/+2
* In ssl3_send_newsession_ticket(), fix a memory leak in an error path.miod2014-06-181-2/+4
* tags as requested by miod and teduderaadt2014-06-121-1/+1