summaryrefslogtreecommitdiff
path: root/src/lib/libssl/t1_lib.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Correct test reversed during merge of fix for CVE-2014-3509guenther2014-08-071-2/+2
* merge fix for CVE-2014-3509 -- basically a missing s->hit check; ok guentherderaadt2014-08-061-9/+13
* Expand the tlsext_sigalg macros. The end result is about the same numberjsing2014-07-131-16/+19
* The bell tolls for BUF_strdup - Start the migration to usingbeck2014-07-131-2/+3
* The correct name for EDH is DHE, likewise EECDH should be ECDHE.jsing2014-07-121-4/+4
* remove unused, private version strings except SSL_version_strbcook2014-07-091-3/+1
* convert CRYPTO_memcmp to timingsafe_memcmp based on current policy favoringtedu2014-06-191-3/+3
* Make sure to always invoke EVP_CIPHER_CTX_cleanup() before returning in themiod2014-06-181-4/+10
* Remove support for the `opaque PRF input' extension, which draft has expiredmiod2014-06-131-213/+1
* tags as requested by miod and teduderaadt2014-06-121-1/+1
* Sanitize use of client_opaque_prf_input: set it to NULL immediately aftermiod2014-06-041-18/+22
* without overthinking it, replace a few memcmp calls with CRYPTO_memcmptedu2014-06-041-1/+1
* ECDH and ECDSA will not work overly well if there is no EC, so unifdefjsing2014-05-311-22/+0
* TLS would not be entirely functional without extensions, so unifdefjsing2014-05-311-6/+0
* remove some #if 0 code. we don't need any more reminders that we're usingtedu2014-05-301-36/+0
* Make use of SSL_IS_DTLS, SSL_USE_EXPLICIT_IV, SSL_USE_SIGALGS andjsing2014-05-301-3/+4
* unidef DH, ECDH, and ECDSA. there's no purpose to a libssl without them.tedu2014-05-291-10/+0
* Make it substantially easier to identify protocol version requirementsjsing2014-05-291-0/+38
* There is no point in checking if a pointer is non-NULL before calling free,jsing2014-05-281-32/+18
* Replace the following logic:miod2014-05-261-26/+39
* tls_decrypt_ticket(): memory leak and uncleaned EVP_CIPHER_CTX upon error.miod2014-05-261-1/+4
* Use C99 initialisers for SSL3_ENC_METHOD structs.jsing2014-05-241-12/+14
* Enable three brainpool elliptic curves for TLS, as specified in RFC 7027;miod2014-05-241-1/+13
* Use sizeof(cryptopro_ext) instead of 36 when applicable.miod2014-05-241-4/+4
* More KNF.jsing2014-05-221-184/+194
* Fix several bounds checks in ssl_add_clienthello_tlsext() andmiod2014-05-191-34/+39
* Remove SRP and Kerberos support from libssl. These are complex protocolstedu2014-05-051-50/+0
* Appease gcc3 -Wuninitialized.miod2014-04-261-1/+1
* more malloc/realloc/calloc cleanups; ok beck kettenisderaadt2014-04-211-6/+9
* More KNF and style consistency tweaksguenther2014-04-191-6/+6
* now that knf carpet bombing is finished, switch to hand to hand combat.tedu2014-04-181-91/+91
* always build in RSA and DSA. ok deraadt miodtedu2014-04-171-20/+0
* SHA and AES (and sadly MD5) can't be considered optional. ok beck miodtedu2014-04-171-8/+0
* quick pass at removing ability to disable sha256 and sha512. ok miodtedu2014-04-171-12/+0
* Change library to use intrinsic memory allocation functions instead ofbeck2014-04-171-28/+28
* add back SRP. i was being too greedy.tedu2014-04-161-0/+50
* Thanks to the knobs in http://tools.ietf.org/html/rfc5746, we have a knobbeck2014-04-161-4/+2
* disentangle SRP code from TLStedu2014-04-161-50/+0
* make OPENSSL_NO_HEARTBLEED the default and only option. ok deraadt miodtedu2014-04-141-214/+0
* First pass at applying KNF to the OpenSSL code, which almost makes itjsing2014-04-141-1067/+935
* Merge conflicts; remove MacOS, Netware, OS/2, VMS and Windows build machinery.miod2014-04-131-61/+208
* cherrypick fix for CVE-2014-0160 "heartbleed" vulnerability fromdjm2014-04-071-5/+9
* cherry pick bugfixes for http://www.openssl.org/news/secadv_20130205.txtmarkus2013-02-141-1/+1
* resolve conflictsdjm2012-10-131-58/+883
* OpenSSL 1.0.0f: mergedjm2012-01-051-0/+6
* openssl-1.0.0e: resolve conflictsdjm2011-11-031-9/+11
* fix for CVE-2011-0014 "OCSP stapling vulnerability";djm2011-02-101-1/+7
* - Apply security fix for CVE-2010-3864 (+commit 19998 which fixes the fix).jasper2010-11-171-18/+42
* resolve conflicts, fix local changesdjm2010-10-011-40/+877
* update to openssl-0.9.8i; tested by several, especially krw@djm2009-01-051-6/+8