summaryrefslogtreecommitdiff
path: root/src/lib/libssl/s3_srvr.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Convert several of the server side handshake functions to the new handshakejsing2015-02-071-57/+25
* Unifdef NETSCAPE_HANG_BUG.jsing2015-02-061-22/+1
* Bring back the horrible API that is get_cipher_by_char/put_cipher_by_char.jsing2015-02-061-1/+3
* don't leak timing info about padding errors by generating a fake keytedu2014-12-291-5/+10
* Add error handling for EVP_DigestInit_ex().doug2014-12-151-3/+4
* unifdef OPENSSL_NO_NEXTPROTONEG, which is one of the last standing #ifndefjsing2014-12-141-17/+1
* ssl3_init_finished_mac() calls BIO_new() which can fail since it in turnjsing2014-12-101-3/+10
* Remove support for GOST R 34.10-94 signature authentication, along withjsing2014-12-101-4/+2
* Update the GOST code in libssl, as contributed by Dmitry Eremin-Solenikov.miod2014-11-181-22/+56
* Sort and group includes.jsing2014-11-161-5/+7
* Add support for automatic DH ephemeral keys.jsing2014-10-311-4/+17
* Remove support for ephemeral/temporary RSA private keys.jsing2014-10-311-80/+14
* Use arc4random_buf() instead of RAND_bytes() or RAND_pseudo_bytes().jsing2014-10-181-9/+4
* Add support for automatic ephemeral EC keys.jsing2014-10-031-3/+11
* There is not much point checking ecdhp is not NULL... twice.jsing2014-09-271-8/+3
* remove obfuscating parens. man operator is your friend.tedu2014-09-191-9/+9
* Remove SSL_kDHr, SSL_kDHd and SSL_aDH. No supported ciphersuites use them,jsing2014-09-071-5/+3
* Replace the remaining uses of ssl3_put_cipher_by_char() with s2n and ajsing2014-08-241-4/+3
* Unchecked memory allocation and potential leak upon error inmiod2014-08-111-5/+12
* Since we no longer need to support SSLv2-style cipher lists, startjsing2014-08-101-3/+1
* The RSA, DH, and ECDH temporary key callbacks expect the number of keybitsguenther2014-07-281-4/+7
* The correct name for EDH is DHE, likewise EECDH should be ECDHE.jsing2014-07-121-9/+9
* Remove remnants from PSK, KRB5 and SRP.jsing2014-07-121-40/+16
* Place comments in a block above the if statement, rather than attemptingjsing2014-07-121-29/+31
* As reported by David Ramos, most consumer of ssl_get_message() perform latemiod2014-07-111-41/+65
* In ssl3_get_cert_verify(), allow for larger messages to accomodate keysmiod2014-07-111-3/+2
* In ssl3_get_client_key_exchange() parsing a GOST session key, invoke themiod2014-07-111-13/+8
* Remove the PSK code. We don't need to drag around thisbeck2014-07-111-108/+1
* remove unused variable from ssl3_get_client_hellobcook2014-07-101-3/+2
* decompress libssl. ok beck jsingtedu2014-07-101-96/+1
* KNF comments, reflowing and moving out of the middle of argument lists inguenther2014-07-101-32/+41
* tedu the SSL export cipher handling - since we do not have enabled exportjsing2014-07-091-27/+6
* fix the identical leak in three different files.tedu2014-06-301-2/+3
* convert CRYPTO_memcmp to timingsafe_memcmp based on current policy favoringtedu2014-06-191-2/+2
* In ssl3_send_newsession_ticket(), fix a memory leak in an error path.miod2014-06-181-2/+4
* tags as requested by miod and teduderaadt2014-06-121-1/+1
* Stop setting the EVP_MD_CTX_FLAG_NON_FIPS_ALLOW - it has been ignored sincejsing2014-06-111-2/+0
* c-file-style hints, begone; ok beckderaadt2014-06-111-1/+1
* http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2016265dfbab162ec...deraadt2014-06-071-4/+1
* The DH_free, EC_KEY_free, EVP_PKEY_free and RSA_free functions all havejsing2014-06-071-11/+6
* Be selective as to when ChangeCipherSpec messages will be accepted.jsing2014-06-051-2/+5
* without overthinking it, replace a few memcmp calls with CRYPTO_memcmptedu2014-06-041-1/+1
* More manual OPENSSL_NO_EC and OPENSSL_NO_TLSEXT cleanup.jsing2014-05-311-4/+4
* TLS would not be entirely functional without extensions, so unifdefjsing2014-05-311-27/+0
* Make use of SSL_IS_DTLS, SSL_USE_EXPLICIT_IV, SSL_USE_SIGALGS andjsing2014-05-301-19/+13
* the comment says RAND_pseudo_bytes should be RAND_bytes. make it so.tedu2014-05-291-6/+1
* unidef DH, ECDH, and ECDSA. there's no purpose to a libssl without them.tedu2014-05-291-30/+0
* There is no point in checking if a pointer is non-NULL before calling free,jsing2014-05-281-6/+3
* Remove TLS_DEBUG, SSL_DEBUG, CIPHER_DEBUG and OPENSSL_RI_DEBUG. Much ofjsing2014-05-251-19/+0
* DeIMPLEMENT libssl. Expand the IMPLEMENT_* macros since it is far morejsing2014-05-241-4/+38