summaryrefslogtreecommitdiff
path: root/src/lib/libssl/t1_lib.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* This commit was manufactured by cvs2git to create tag 'OPENBSD_5_8_BASE'.OPENBSD_5_8_BASEcvs2svn2015-08-021-2423/+0
* Convert tls1_process_ticket to CBS.doug2015-07-241-28/+36
* Convert tls1_process_sigalgs to CBS.doug2015-07-241-5/+14
* Allow *_free() functions in libssl to handle NULL input.doug2015-07-191-1/+4
* Remove compat hack that disabled ECDHE-ECDSA on OS X.doug2015-07-171-85/+1
* Convert tls1_alpn_handle_client_hello() to CBS.doug2015-06-191-20/+14
* Convert ssl_next_proto_validate to CBS.doug2015-06-171-11/+12
* Convert tls1_check_curve to CBS.doug2015-06-171-4/+10
* Fix a minor information leak that was introduced in t1_lib.c r1.71, wherebyjsing2015-03-021-2/+2
* unifdef OPENSSL_NO_NEXTPROTONEG, which is one of the last standing #ifndefjsing2014-12-141-17/+1
* Remove support for GOST R 34.10-94 signature authentication, along withjsing2014-12-101-4/+1
* Add support for ALPN.jsing2014-12-101-3/+152
* Use appropriate internal types for EC curves and formats, rather thanjsing2014-12-061-103/+115
* Ensure that the client specified EC curve list length is a multiple of two.jsing2014-12-061-2/+3
* Fix two cases where it is possible to read one or two bytes past the end ofjsing2014-12-061-3/+15
* Add brainpool curves to eccurves_default[], accidentally missing from 1.32;miod2014-12-021-2/+5
* Update the GOST code in libssl, as contributed by Dmitry Eremin-Solenikov.miod2014-11-181-3/+36
* only call SRTP (whatever that is) functions when the connection type istedu2014-11-031-5/+5
* Use arc4random_buf() instead of RAND_bytes() or RAND_pseudo_bytes().jsing2014-10-181-2/+1
* Only require an EC public key in tls1_set_ec_id(), if we need to providejsing2014-10-151-4/+4
* Use more specific curves/formats naming for local variables injsing2014-10-051-30/+28
* Use tls1_get_curvelist() in ssl_add_clienthello_tlsext(), rather thanjsing2014-10-051-11/+2
* Make tls1_get_formatlist() behave the same as tls1_get_curvelist() andjsing2014-10-051-21/+29
* Add support for automatic ephemeral EC keys.jsing2014-10-031-3/+38
* Clean up EC cipher handling in ssl3_choose_cipher().jsing2014-09-301-3/+132
* Check that the specified curve is one of the client preferences.jsing2014-09-271-1/+44
* Now that we have a static version of the default EC formats, also use itjsing2014-09-261-47/+44
* Refactor and simplify the ECC extension handling. The existing codejsing2014-09-221-101/+97
* Move the TLS padding extension under an SSL_OP_TLSEXT_PADDING option, whichjsing2014-09-211-8/+13
* Correct test reversed during merge of fix for CVE-2014-3509guenther2014-08-071-2/+2
* merge fix for CVE-2014-3509 -- basically a missing s->hit check; ok guentherderaadt2014-08-061-9/+13
* Expand the tlsext_sigalg macros. The end result is about the same numberjsing2014-07-131-16/+19
* The bell tolls for BUF_strdup - Start the migration to usingbeck2014-07-131-2/+3
* The correct name for EDH is DHE, likewise EECDH should be ECDHE.jsing2014-07-121-4/+4
* remove unused, private version strings except SSL_version_strbcook2014-07-091-3/+1
* convert CRYPTO_memcmp to timingsafe_memcmp based on current policy favoringtedu2014-06-191-3/+3
* Make sure to always invoke EVP_CIPHER_CTX_cleanup() before returning in themiod2014-06-181-4/+10
* Remove support for the `opaque PRF input' extension, which draft has expiredmiod2014-06-131-213/+1
* tags as requested by miod and teduderaadt2014-06-121-1/+1
* Sanitize use of client_opaque_prf_input: set it to NULL immediately aftermiod2014-06-041-18/+22
* without overthinking it, replace a few memcmp calls with CRYPTO_memcmptedu2014-06-041-1/+1
* ECDH and ECDSA will not work overly well if there is no EC, so unifdefjsing2014-05-311-22/+0
* TLS would not be entirely functional without extensions, so unifdefjsing2014-05-311-6/+0
* remove some #if 0 code. we don't need any more reminders that we're usingtedu2014-05-301-36/+0
* Make use of SSL_IS_DTLS, SSL_USE_EXPLICIT_IV, SSL_USE_SIGALGS andjsing2014-05-301-3/+4
* unidef DH, ECDH, and ECDSA. there's no purpose to a libssl without them.tedu2014-05-291-10/+0
* Make it substantially easier to identify protocol version requirementsjsing2014-05-291-0/+38
* There is no point in checking if a pointer is non-NULL before calling free,jsing2014-05-281-32/+18
* Replace the following logic:miod2014-05-261-26/+39
* tls_decrypt_ticket(): memory leak and uncleaned EVP_CIPHER_CTX upon error.miod2014-05-261-1/+4