summaryrefslogtreecommitdiff
path: root/src/lib/libssl/t1_lib.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Remove support for fixed ECDH cipher suites - these is not widely supportedjsing2016-10-191-6/+4
* Check for and handle failure of HMAC_{Update,Final} or EVP_DecryptUpdate()guenther2016-10-021-5/+11
* Detect zero-length encrypted session data early, instead of when malloc(0)guenther2016-10-021-2/+2
* Avoid unbounded memory growth, which can be triggered by a clientjsing2016-09-221-9/+20
* Improve ticket validity checking when tlsext_ticket_key_cb() callbackguenther2016-09-221-4/+25
* Be more strict when parsing TLS extensions.jsing2016-08-271-17/+37
* deprecate internal use of EVP_[Cipher|Encrypt|Decrypt]_Final.beck2016-05-301-2/+2
* http -> https for a few more IETF URLs in comments or man pagesmmcc2016-03-101-2/+2
* Remove most of the SSLv3 version checks and a few TLS v1.0.doug2015-09-121-11/+2
* Remove the ssl_prepare_{client,server}hello_tlsext() functions, which arejsing2015-09-011-13/+1
* Properly handle missing TLS extensions in client hello as a non-failure.bcook2015-08-191-1/+3
* Convert tls1_process_ticket to CBS.doug2015-07-241-28/+36
* Convert tls1_process_sigalgs to CBS.doug2015-07-241-5/+14
* Allow *_free() functions in libssl to handle NULL input.doug2015-07-191-1/+4
* Remove compat hack that disabled ECDHE-ECDSA on OS X.doug2015-07-171-85/+1
* Convert tls1_alpn_handle_client_hello() to CBS.doug2015-06-191-20/+14
* Convert ssl_next_proto_validate to CBS.doug2015-06-171-11/+12
* Convert tls1_check_curve to CBS.doug2015-06-171-4/+10
* Fix a minor information leak that was introduced in t1_lib.c r1.71, wherebyjsing2015-03-021-2/+2
* unifdef OPENSSL_NO_NEXTPROTONEG, which is one of the last standing #ifndefjsing2014-12-141-17/+1
* Remove support for GOST R 34.10-94 signature authentication, along withjsing2014-12-101-4/+1
* Add support for ALPN.jsing2014-12-101-3/+152
* Use appropriate internal types for EC curves and formats, rather thanjsing2014-12-061-103/+115
* Ensure that the client specified EC curve list length is a multiple of two.jsing2014-12-061-2/+3
* Fix two cases where it is possible to read one or two bytes past the end ofjsing2014-12-061-3/+15
* Add brainpool curves to eccurves_default[], accidentally missing from 1.32;miod2014-12-021-2/+5
* Update the GOST code in libssl, as contributed by Dmitry Eremin-Solenikov.miod2014-11-181-3/+36
* only call SRTP (whatever that is) functions when the connection type istedu2014-11-031-5/+5
* Use arc4random_buf() instead of RAND_bytes() or RAND_pseudo_bytes().jsing2014-10-181-2/+1
* Only require an EC public key in tls1_set_ec_id(), if we need to providejsing2014-10-151-4/+4
* Use more specific curves/formats naming for local variables injsing2014-10-051-30/+28
* Use tls1_get_curvelist() in ssl_add_clienthello_tlsext(), rather thanjsing2014-10-051-11/+2
* Make tls1_get_formatlist() behave the same as tls1_get_curvelist() andjsing2014-10-051-21/+29
* Add support for automatic ephemeral EC keys.jsing2014-10-031-3/+38
* Clean up EC cipher handling in ssl3_choose_cipher().jsing2014-09-301-3/+132
* Check that the specified curve is one of the client preferences.jsing2014-09-271-1/+44
* Now that we have a static version of the default EC formats, also use itjsing2014-09-261-47/+44
* Refactor and simplify the ECC extension handling. The existing codejsing2014-09-221-101/+97
* Move the TLS padding extension under an SSL_OP_TLSEXT_PADDING option, whichjsing2014-09-211-8/+13
* Correct test reversed during merge of fix for CVE-2014-3509guenther2014-08-071-2/+2
* merge fix for CVE-2014-3509 -- basically a missing s->hit check; ok guentherderaadt2014-08-061-9/+13
* Expand the tlsext_sigalg macros. The end result is about the same numberjsing2014-07-131-16/+19
* The bell tolls for BUF_strdup - Start the migration to usingbeck2014-07-131-2/+3
* The correct name for EDH is DHE, likewise EECDH should be ECDHE.jsing2014-07-121-4/+4
* remove unused, private version strings except SSL_version_strbcook2014-07-091-3/+1
* convert CRYPTO_memcmp to timingsafe_memcmp based on current policy favoringtedu2014-06-191-3/+3
* Make sure to always invoke EVP_CIPHER_CTX_cleanup() before returning in themiod2014-06-181-4/+10
* Remove support for the `opaque PRF input' extension, which draft has expiredmiod2014-06-131-213/+1
* tags as requested by miod and teduderaadt2014-06-121-1/+1
* Sanitize use of client_opaque_prf_input: set it to NULL immediately aftermiod2014-06-041-18/+22