| Commit message (Expand) | Author | Age | Files | Lines |
... | |
* | only call SRTP (whatever that is) functions when the connection type is | tedu | 2014-11-03 | 1 | -5/+5 |
* | Use arc4random_buf() instead of RAND_bytes() or RAND_pseudo_bytes(). | jsing | 2014-10-18 | 1 | -2/+1 |
* | Only require an EC public key in tls1_set_ec_id(), if we need to provide | jsing | 2014-10-15 | 1 | -4/+4 |
* | Use more specific curves/formats naming for local variables in | jsing | 2014-10-05 | 1 | -30/+28 |
* | Use tls1_get_curvelist() in ssl_add_clienthello_tlsext(), rather than | jsing | 2014-10-05 | 1 | -11/+2 |
* | Make tls1_get_formatlist() behave the same as tls1_get_curvelist() and | jsing | 2014-10-05 | 1 | -21/+29 |
* | Add support for automatic ephemeral EC keys. | jsing | 2014-10-03 | 1 | -3/+38 |
* | Clean up EC cipher handling in ssl3_choose_cipher(). | jsing | 2014-09-30 | 1 | -3/+132 |
* | Check that the specified curve is one of the client preferences. | jsing | 2014-09-27 | 1 | -1/+44 |
* | Now that we have a static version of the default EC formats, also use it | jsing | 2014-09-26 | 1 | -47/+44 |
* | Refactor and simplify the ECC extension handling. The existing code | jsing | 2014-09-22 | 1 | -101/+97 |
* | Move the TLS padding extension under an SSL_OP_TLSEXT_PADDING option, which | jsing | 2014-09-21 | 1 | -8/+13 |
* | Correct test reversed during merge of fix for CVE-2014-3509 | guenther | 2014-08-07 | 1 | -2/+2 |
* | merge fix for CVE-2014-3509 -- basically a missing s->hit check; ok guenther | deraadt | 2014-08-06 | 1 | -9/+13 |
* | Expand the tlsext_sigalg macros. The end result is about the same number | jsing | 2014-07-13 | 1 | -16/+19 |
* | The bell tolls for BUF_strdup - Start the migration to using | beck | 2014-07-13 | 1 | -2/+3 |
* | The correct name for EDH is DHE, likewise EECDH should be ECDHE. | jsing | 2014-07-12 | 1 | -4/+4 |
* | remove unused, private version strings except SSL_version_str | bcook | 2014-07-09 | 1 | -3/+1 |
* | convert CRYPTO_memcmp to timingsafe_memcmp based on current policy favoring | tedu | 2014-06-19 | 1 | -3/+3 |
* | Make sure to always invoke EVP_CIPHER_CTX_cleanup() before returning in the | miod | 2014-06-18 | 1 | -4/+10 |
* | Remove support for the `opaque PRF input' extension, which draft has expired | miod | 2014-06-13 | 1 | -213/+1 |
* | tags as requested by miod and tedu | deraadt | 2014-06-12 | 1 | -1/+1 |
* | Sanitize use of client_opaque_prf_input: set it to NULL immediately after | miod | 2014-06-04 | 1 | -18/+22 |
* | without overthinking it, replace a few memcmp calls with CRYPTO_memcmp | tedu | 2014-06-04 | 1 | -1/+1 |
* | ECDH and ECDSA will not work overly well if there is no EC, so unifdef | jsing | 2014-05-31 | 1 | -22/+0 |
* | TLS would not be entirely functional without extensions, so unifdef | jsing | 2014-05-31 | 1 | -6/+0 |
* | remove some #if 0 code. we don't need any more reminders that we're using | tedu | 2014-05-30 | 1 | -36/+0 |
* | Make use of SSL_IS_DTLS, SSL_USE_EXPLICIT_IV, SSL_USE_SIGALGS and | jsing | 2014-05-30 | 1 | -3/+4 |
* | unidef DH, ECDH, and ECDSA. there's no purpose to a libssl without them. | tedu | 2014-05-29 | 1 | -10/+0 |
* | Make it substantially easier to identify protocol version requirements | jsing | 2014-05-29 | 1 | -0/+38 |
* | There is no point in checking if a pointer is non-NULL before calling free, | jsing | 2014-05-28 | 1 | -32/+18 |
* | Replace the following logic: | miod | 2014-05-26 | 1 | -26/+39 |
* | tls_decrypt_ticket(): memory leak and uncleaned EVP_CIPHER_CTX upon error. | miod | 2014-05-26 | 1 | -1/+4 |
* | Use C99 initialisers for SSL3_ENC_METHOD structs. | jsing | 2014-05-24 | 1 | -12/+14 |
* | Enable three brainpool elliptic curves for TLS, as specified in RFC 7027; | miod | 2014-05-24 | 1 | -1/+13 |
* | Use sizeof(cryptopro_ext) instead of 36 when applicable. | miod | 2014-05-24 | 1 | -4/+4 |
* | More KNF. | jsing | 2014-05-22 | 1 | -184/+194 |
* | Fix several bounds checks in ssl_add_clienthello_tlsext() and | miod | 2014-05-19 | 1 | -34/+39 |
* | Remove SRP and Kerberos support from libssl. These are complex protocols | tedu | 2014-05-05 | 1 | -50/+0 |
* | Appease gcc3 -Wuninitialized. | miod | 2014-04-26 | 1 | -1/+1 |
* | more malloc/realloc/calloc cleanups; ok beck kettenis | deraadt | 2014-04-21 | 1 | -6/+9 |
* | More KNF and style consistency tweaks | guenther | 2014-04-19 | 1 | -6/+6 |
* | now that knf carpet bombing is finished, switch to hand to hand combat. | tedu | 2014-04-18 | 1 | -91/+91 |
* | always build in RSA and DSA. ok deraadt miod | tedu | 2014-04-17 | 1 | -20/+0 |
* | SHA and AES (and sadly MD5) can't be considered optional. ok beck miod | tedu | 2014-04-17 | 1 | -8/+0 |
* | quick pass at removing ability to disable sha256 and sha512. ok miod | tedu | 2014-04-17 | 1 | -12/+0 |
* | Change library to use intrinsic memory allocation functions instead of | beck | 2014-04-17 | 1 | -28/+28 |
* | add back SRP. i was being too greedy. | tedu | 2014-04-16 | 1 | -0/+50 |
* | Thanks to the knobs in http://tools.ietf.org/html/rfc5746, we have a knob | beck | 2014-04-16 | 1 | -4/+2 |
* | disentangle SRP code from TLS | tedu | 2014-04-16 | 1 | -50/+0 |