summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl.h (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* The ssl_ciper_get_evp() function is currently overloaded to also return thejsing2014-05-251-0/+1
| | | | | | | | | | | compression associated with the SSL session. Based on one of Adam Langley's chromium diffs, factor out the compression handling code into a separate ssl_cipher_get_comp() function. Rewrite the compression handling code to avoid pointless duplication and so that failures are actually returned to and detectable by the caller. ok miod@
* Include <openssl/opensslconf.h> - currently ssl.h is relying on it beingjsing2014-05-241-1/+2
| | | | | | | pulled in elsewhere, even though it is makes use of the OPENSSL_NO_* defines. While here, remove kssl.h since it is a no-op. ok beck@ miod@
* There are two actual uses of e_os2.h in libssl - an OPENSSL_GLOBAL (anjsing2014-05-221-2/+0
| | | | | | | | | empty define) and an OPENSSL_EXTERN (which is defined as, well... extern). The use of OPENSSL_EXTERN is already inconsistent since the lines above and below just use plain old "extern". Expand the two uses of these macros and stop including e_os2.h in libssl. ok miod@
* Remove SRP and Kerberos support from libssl. These are complex protocolstedu2014-05-051-70/+0
| | | | | all on their own and we can't effectively maintain them without using them, which we don't. If the need arises, the code can be resurrected.
* Nuke OPENSSL_NO_SOCK since any half sane operating system has sockets.jsing2014-05-021-2/+0
| | | | ok beck@
* i suck at math. b - 8 = 3, not 4. detected by Antoine Pitrou. thanks.tedu2014-04-301-1/+1
|
* SSL_OP_ALL is supposed to be all options and workarounds that are safe,tedu2014-04-281-4/+6
| | | | | | | | but disabling attack mitigations is not safe. 0.9.6d contained a workaround for an attack against CBC modes. 0.9.6e disabled it by default because "some" implementations couldn't handle empty fragments. 12 years have passed. Does anybody still care? Let's find out. ok miod
* Remove ending cplusplus guard followed by starting cplusplus guard; frommiod2014-04-281-7/+0
| | | | Gebruiker Schoot.
* Bring back the SSL_OP_PKCS1_CHECK_* defines (defined to zero, as they alreadymiod2014-04-241-0/+4
| | | | were), after stumbling upon code (mis)using them in the wild.
* Unifdef -UPKCS1_CHECK and remove SSL_OP_PKCS1_CHECK_[12], this is leftovermiod2014-04-231-8/+0
| | | | | | | | ``debug'' code from a 15+ years old bugfix and the SSL_OP_PKCS1_CHECK_* constants have had a value of zero since ages. No production code should use them. ok beck@
* Chop off more SSLv2 tentacles and start fixing and noting y2038 issues.guenther2014-04-201-13/+7
| | | | | | | APIs that pass times as longs will have to change at some point... Bump major on both libcrypto and libssl. ok tedu@
* More KNF and style consistency tweaksguenther2014-04-191-3/+2
|
* always build in RSA and DSA. ok deraadt miodtedu2014-04-171-6/+0
|
* TANSTAAFL - delete the buf freelist code. if you need a better malloc, gettedu2014-04-161-6/+0
| | | | a better malloc. ok beck deraadt
* add back SRP. i was being too greedy.tedu2014-04-161-0/+63
|
* disentangle SRP code from TLStedu2014-04-161-63/+0
|
* remove ssl2 support even more completely.tedu2014-04-151-10/+0
| | | | | | in the process, always include ssl3 and tls1, we don't need config options for them. when the time comes to expire ssl3, it will be with an ax. checked by miod
* First pass at applying KNF to the OpenSSL code, which almost makes itjsing2014-04-151-257/+250
| | | | | | | readable. This pass is whitespace only and can readily be verified using tr and md5. There is still a huge amount of inconsistency within these headers.
* make OPENSSL_NO_HEARTBLEED the default and only option. ok deraadt miodtedu2014-04-141-10/+0
|
* Cope with the removal of openssl/symhacks.hderaadt2014-04-131-1/+0
|
* Flense a variety of windows support stuff, and a strange gettimeofday function.beck2014-04-131-4/+0
| | | | ok deraadt@
* Remove vms support stuff.beck2014-04-131-6/+1
| | | | ok deraadt@
* Merge conflicts; remove MacOS, Netware, OS/2, VMS and Windows build machinery.miod2014-04-131-3/+18
|
* resolve conflictsdjm2012-10-131-22/+291
|
* OpenSSL 1.0.0f: mergedjm2012-01-051-0/+2
|
* resolve conflicts, fix local changesdjm2010-10-011-156/+383
|
* update to openssl-0.9.8i; tested by several, especially krw@djm2009-01-051-3/+13
|
* resolve conflictsdjm2008-09-061-59/+271
|
* resolve conflictsdjm2006-06-271-31/+26
|
* resolve conflictsdjm2005-04-291-57/+61
|
* merge 0.9.7dmarkus2004-04-081-2/+2
|
* merge 0.9.7b with local changes; crank majors for libssl/libcryptomarkus2003-05-121-7/+23
|
* merge with openssl-0.9.7-stable-SNAP-20020911,markus2002-09-141-0/+6
| | | | | new minor for libcrypto (_X509_REQ_print_ex) tested by miod@, pb@
* merge openssl-0.9.7-beta3, tested on vax by miod@markus2002-09-101-7/+37
|
* apply patches from OpenSSL Security Advisory [30 July 2002],markus2002-07-301-0/+2
| | | | http://marc.theaimsgroup.com/?l=openssl-dev&m=102802395104110&w=2
* OpenSSL 0.9.7 stable 2002 05 08 mergebeck2002-05-151-104/+338
|
* openssl-engine-0.9.6a mergebeck2001-06-221-6/+10
|
* openssl-engine-0.9.6 mergebeck2000-12-151-17/+46
|
* OpenSSL 0.9.5a mergebeck2000-04-151-3/+3
|
* OpenSSL 0.9.5 mergebeck2000-03-191-34/+83
| | | | | | *warning* this bumps shared lib minors for libssl and libcrypto from 2.1 to 2.2 if you are using the ssl26 packages for ssh and other things to work you will need to get new ones (see ~beck/libsslsnap/<arch>) on cvs or ~beck/src-patent.tar.gz on cvs
* OpenSSL 0.9.4 mergebeck1999-09-291-565/+596
|
* Import of SSLeay-0.9.0b with RSA and IDEA stubbed + OpenBSD buildryker1998-10-051-0/+1453
functionality for shared libs. Note that routines such as sslv2_init and friends that use RSA will not work due to lack of RSA in this library. Needs documentation and help from ports for easy upgrade to full functionality where legally possible.