summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Fix conditionals for DH controls.jsing2017-08-091-3/+3
* add missing and correct misspelled names, most in NAME sections;schwarze2017-08-012-6/+8
* as noted by Hanno Boeck, using the *check_private_key functions isbenno2017-07-251-6/+22
* Rewrite and move the last remnants of the ServerHello SNI handling intojsing2017-07-242-29/+25
* Rewrite the TLS Renegotiation Indication extension handling using CBB/CBSjsing2017-07-246-346/+161
* Hook the TLS extension parsing framework into the serverhello parsing.jsing2017-07-231-1/+6
* Check the return value of CBB_init_fixed(), since it can fail.jsing2017-07-191-3/+5
* Start rewriting TLS extension handling.jsing2017-07-164-141/+328
* Remove unused variable.jsing2017-07-151-3/+3
* nits about trailing punctuation found with mandoc -Tlintschwarze2017-07-051-4/+4
* fix cross references to self; found with mandoc -Tlintschwarze2017-07-052-6/+6
* fix broken markup of callback arguments; found with mandoc -Tlintschwarze2017-06-102-11/+8
* Drop cipher suites with DSS authentication - there is no good reason tojsing2017-05-071-197/+1
* Instead of starting a 'zero-sized' CBB at the size of the first additionjsing2017-05-071-5/+8
* Move state from ssl->internal to the handshake structure.beck2017-05-0715-256/+267
* Bring in an SSL_HANDSHAKE structure and commence the great shovellingbeck2017-05-0611-113/+119
* Provide SSL{,_CTX}_set_{min,max}_proto_version() functions.jsing2017-05-066-5/+115
* Bump minors for symbol addition in libcryptobeck2017-05-061-1/+1
* Add missing $OpenBSD$ tags.jsing2017-05-064-2/+4
* Only enable -Werror on libcrypto/libssl/libtls if we are building withjsing2017-04-301-2/+3
* Switch back to freezero() and explicitly initialise data_len to zero. Thejsing2017-04-301-6/+3
* Fix a bug caused by the return value being set early to signal successfuljsing2017-04-291-5/+5
* Revert previous - we still want to do this, but I forgot about the installerbeck2017-04-292-14/+6
* We now require you to have a working libpthreadbeck2017-04-291-1/+2
* Make it safe to call SSL_library_init more than once.beck2017-04-291-5/+12
* backout previous, data_len is not always initializedotto2017-04-161-2/+5
* Use freezero(3) when cleaning up session tickets - not only does it requirejsing2017-04-141-6/+3
* Use freezero(3) to clean up the X25519 keys - simpler, cleaner code.jsing2017-04-141-6/+3
* Use freezero(3) in the CBB clean up path, since this could hold sensitivejsing2017-04-141-3/+2
* Switch i2d_SSL_SESSION() back to freezero(3) now that the size constraintsjsing2017-04-141-5/+2
* Clean up server key exchange EC point handling. Encode the point directlyjsing2017-04-141-27/+15
* Revert ssl_asn1.c r1.50 - CBB and freezero(3) do not play nicely together.jsing2017-04-111-2/+5
* Use freezero() for the internal opaque structures, instead of the currentjsing2017-04-103-18/+9
* Use freezero() for X25519 keys - same result with more readable code.jsing2017-04-101-7/+3
* freezero() the key block; simpler code and less of it.jsing2017-04-101-7/+3
* Use freezero() for i2d_SSL_SESSION() - one line of code instead of three.jsing2017-04-101-5/+2
* fix some .Xr errors that jmc@ found with mdoclint(1)schwarze2017-04-103-12/+13
* new manual page SSL_get_server_tmp_key(3)schwarze2017-04-103-2/+88
* Additional SSL_SESSION documentationschwarze2017-04-1011-16/+349
* for pure *_ctrl() wrapper macros, move the reference from ssl(3)schwarze2017-04-1014-49/+54
* new manual page SSL_CTX_set_tlsext_servername_callback(3) for SNI;schwarze2017-04-102-1/+126
* Convert various client key exchange functions to freezero(3). The memoryjsing2017-04-101-14/+5
* pasto; from <Jon dot Spillett at oracle dot com> via OpenSSL commit 3aaa1bd0schwarze2017-04-101-3/+3
* typo fix; from <Jon dot Spillett at oracle dot com>schwarze2017-04-101-5/+5
* tweak previous;jmc2017-03-291-3/+5
* Fix typo in function name;schwarze2017-03-281-4/+5
* After i wrote SSL_renegotiate(3) from scratch, OpenSSL alsoschwarze2017-03-281-12/+109
* Update RFC reference for TLSEXT_TYPE_padding.jsing2017-03-251-5/+2
* Check tls1_PRF() return value in tls1_generate_master_secret().jsing2017-03-251-4/+4
* More cleanup for tls1_PRF()/tls1_P_hash() - change the argument order ofjsing2017-03-251-46/+50