summaryrefslogtreecommitdiff
path: root/src/lib/libssl/t1_lib.c (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* only call SRTP (whatever that is) functions when the connection type istedu2014-11-031-5/+5
* Use arc4random_buf() instead of RAND_bytes() or RAND_pseudo_bytes().jsing2014-10-181-2/+1
* Only require an EC public key in tls1_set_ec_id(), if we need to providejsing2014-10-151-4/+4
* Use more specific curves/formats naming for local variables injsing2014-10-051-30/+28
* Use tls1_get_curvelist() in ssl_add_clienthello_tlsext(), rather thanjsing2014-10-051-11/+2
* Make tls1_get_formatlist() behave the same as tls1_get_curvelist() andjsing2014-10-051-21/+29
* Add support for automatic ephemeral EC keys.jsing2014-10-031-3/+38
* Clean up EC cipher handling in ssl3_choose_cipher().jsing2014-09-301-3/+132
* Check that the specified curve is one of the client preferences.jsing2014-09-271-1/+44
* Now that we have a static version of the default EC formats, also use itjsing2014-09-261-47/+44
* Refactor and simplify the ECC extension handling. The existing codejsing2014-09-221-101/+97
* Move the TLS padding extension under an SSL_OP_TLSEXT_PADDING option, whichjsing2014-09-211-8/+13
* Correct test reversed during merge of fix for CVE-2014-3509guenther2014-08-071-2/+2
* merge fix for CVE-2014-3509 -- basically a missing s->hit check; ok guentherderaadt2014-08-061-9/+13
* Expand the tlsext_sigalg macros. The end result is about the same numberjsing2014-07-131-16/+19
* The bell tolls for BUF_strdup - Start the migration to usingbeck2014-07-131-2/+3
* The correct name for EDH is DHE, likewise EECDH should be ECDHE.jsing2014-07-121-4/+4
* remove unused, private version strings except SSL_version_strbcook2014-07-091-3/+1
* convert CRYPTO_memcmp to timingsafe_memcmp based on current policy favoringtedu2014-06-191-3/+3
* Make sure to always invoke EVP_CIPHER_CTX_cleanup() before returning in themiod2014-06-181-4/+10
* Remove support for the `opaque PRF input' extension, which draft has expiredmiod2014-06-131-213/+1
* tags as requested by miod and teduderaadt2014-06-121-1/+1
* Sanitize use of client_opaque_prf_input: set it to NULL immediately aftermiod2014-06-041-18/+22
* without overthinking it, replace a few memcmp calls with CRYPTO_memcmptedu2014-06-041-1/+1
* ECDH and ECDSA will not work overly well if there is no EC, so unifdefjsing2014-05-311-22/+0
* TLS would not be entirely functional without extensions, so unifdefjsing2014-05-311-6/+0
* remove some #if 0 code. we don't need any more reminders that we're usingtedu2014-05-301-36/+0
* Make use of SSL_IS_DTLS, SSL_USE_EXPLICIT_IV, SSL_USE_SIGALGS andjsing2014-05-301-3/+4
* unidef DH, ECDH, and ECDSA. there's no purpose to a libssl without them.tedu2014-05-291-10/+0
* Make it substantially easier to identify protocol version requirementsjsing2014-05-291-0/+38
* There is no point in checking if a pointer is non-NULL before calling free,jsing2014-05-281-32/+18
* Replace the following logic:miod2014-05-261-26/+39
* tls_decrypt_ticket(): memory leak and uncleaned EVP_CIPHER_CTX upon error.miod2014-05-261-1/+4
* Use C99 initialisers for SSL3_ENC_METHOD structs.jsing2014-05-241-12/+14
* Enable three brainpool elliptic curves for TLS, as specified in RFC 7027;miod2014-05-241-1/+13
* Use sizeof(cryptopro_ext) instead of 36 when applicable.miod2014-05-241-4/+4
* More KNF.jsing2014-05-221-184/+194
* Fix several bounds checks in ssl_add_clienthello_tlsext() andmiod2014-05-191-34/+39
* Remove SRP and Kerberos support from libssl. These are complex protocolstedu2014-05-051-50/+0
* Appease gcc3 -Wuninitialized.miod2014-04-261-1/+1
* more malloc/realloc/calloc cleanups; ok beck kettenisderaadt2014-04-211-6/+9
* More KNF and style consistency tweaksguenther2014-04-191-6/+6
* now that knf carpet bombing is finished, switch to hand to hand combat.tedu2014-04-181-91/+91
* always build in RSA and DSA. ok deraadt miodtedu2014-04-171-20/+0
* SHA and AES (and sadly MD5) can't be considered optional. ok beck miodtedu2014-04-171-8/+0
* quick pass at removing ability to disable sha256 and sha512. ok miodtedu2014-04-171-12/+0
* Change library to use intrinsic memory allocation functions instead ofbeck2014-04-171-28/+28
* add back SRP. i was being too greedy.tedu2014-04-161-0/+50
* Thanks to the knobs in http://tools.ietf.org/html/rfc5746, we have a knobbeck2014-04-161-4/+2
* disentangle SRP code from TLStedu2014-04-161-50/+0