summaryrefslogtreecommitdiff
path: root/src/lib/libssl/s3_srvr.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Remove support for fixed ECDH cipher suites - these is not widely supportedjsing2016-10-191-15/+7
* Check for packet with truncated DTLS cookie.guenther2016-09-221-12/+17
* deprecate internal use of EVP_[Cipher|Encrypt|Decrypt]_Final.beck2016-05-301-2/+2
* X509_free(3) is NULL-safe, so remove NULL checks before its calls.mmcc2016-03-111-5/+3
* deprecate SSL_OP_SINGLE_DH_USElibressl-v2.3.2beck2016-01-271-20/+5
* Use ECDH_size() instead of rolling our own.jsing2015-09-131-6/+6
* The *_accept() functions increment in_handshake at the start of the function,jsing2015-09-131-16/+25
* Remove most of the SSLv3 version checks and a few TLS v1.0.doug2015-09-121-37/+24
* Move handshake message header length determination into a separatejsing2015-09-121-5/+8
* Convert the rest of the server handshake functions to ssl3_handshake_msg_*.jsing2015-09-121-44/+35
* Rename functions that moved to t1_enc.c, with a tls1_ prefix instead of ajsing2015-09-111-9/+9
* Remove support for DTLS_BAD_VER. We do not support non-standard andjsing2015-09-101-2/+2
* Correct spelling of OPENSSL_cleanse.jsing2015-09-101-4/+4
* Remove the ssl_prepare_{client,server}hello_tlsext() functions, which arejsing2015-09-011-6/+1
* Remove SSLv3 method data structs and unlink s3_meth.c from the build.doug2015-08-291-41/+1
* Remove SSLv3 support from LibreSSL.doug2015-08-271-15/+1
* Add linker warnings in case SSLv3_{,client,server}_method are referenced.miod2015-07-291-1/+7
* Remove support for the SSL_OP_TLS_D5_BUG compat hack from SSLeay.doug2015-07-181-8/+4
* Convert ssl3_get_client_certificate to CBS.doug2015-07-141-15/+19
* Convert ssl3_get_next_proto to CBS.doug2015-06-201-14/+19
* Remove Microsoft Server Gated Crypto.doug2015-06-181-56/+7
* KNF whitespace.doug2015-06-171-2/+3
* Remove ancient SSL_OP_NETSCAPE_CA_DN_BUG from SSLeay days.doug2015-06-151-15/+5
* Remove ancient compat hack SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG.doug2015-06-151-24/+1
* Remove 1997's compat hack SSL_OP_SSLEAY_080_CLIENT_DH_BUG.doug2015-06-151-9/+4
* Fix return paths with missing EVP_CIPHER_CTX_cleanup() calls.jsg2015-05-151-1/+2
* Clean up the ssl_bytes_to_cipher_list() API - rather than having thejsing2015-04-151-4/+4
* Factor out the init_buf initialisation code, rather than duplicating itjsing2015-03-271-15/+4
* Fix CVE-2015-0205: Do not accept client authentication with Diffie-Hellmanbcook2015-02-251-2/+2
* Convert several of the server side handshake functions to the new handshakejsing2015-02-071-57/+25
* Unifdef NETSCAPE_HANG_BUG.jsing2015-02-061-22/+1
* Bring back the horrible API that is get_cipher_by_char/put_cipher_by_char.jsing2015-02-061-1/+3
* don't leak timing info about padding errors by generating a fake keytedu2014-12-291-5/+10
* Add error handling for EVP_DigestInit_ex().doug2014-12-151-3/+4
* unifdef OPENSSL_NO_NEXTPROTONEG, which is one of the last standing #ifndefjsing2014-12-141-17/+1
* ssl3_init_finished_mac() calls BIO_new() which can fail since it in turnjsing2014-12-101-3/+10
* Remove support for GOST R 34.10-94 signature authentication, along withjsing2014-12-101-4/+2
* Update the GOST code in libssl, as contributed by Dmitry Eremin-Solenikov.miod2014-11-181-22/+56
* Sort and group includes.jsing2014-11-161-5/+7
* Add support for automatic DH ephemeral keys.jsing2014-10-311-4/+17
* Remove support for ephemeral/temporary RSA private keys.jsing2014-10-311-80/+14
* Use arc4random_buf() instead of RAND_bytes() or RAND_pseudo_bytes().jsing2014-10-181-9/+4
* Add support for automatic ephemeral EC keys.jsing2014-10-031-3/+11
* There is not much point checking ecdhp is not NULL... twice.jsing2014-09-271-8/+3
* remove obfuscating parens. man operator is your friend.tedu2014-09-191-9/+9
* Remove SSL_kDHr, SSL_kDHd and SSL_aDH. No supported ciphersuites use them,jsing2014-09-071-5/+3
* Replace the remaining uses of ssl3_put_cipher_by_char() with s2n and ajsing2014-08-241-4/+3
* Unchecked memory allocation and potential leak upon error inmiod2014-08-111-5/+12
* Since we no longer need to support SSLv2-style cipher lists, startjsing2014-08-101-3/+1
* The RSA, DH, and ECDH temporary key callbacks expect the number of keybitsguenther2014-07-281-4/+7