summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
* Bump minors for symbol addition in libcryptobeck2017-05-061-1/+1
* Add missing $OpenBSD$ tags.jsing2017-05-064-2/+4
* Only enable -Werror on libcrypto/libssl/libtls if we are building withjsing2017-04-301-2/+3
* Switch back to freezero() and explicitly initialise data_len to zero. Thejsing2017-04-301-6/+3
* Fix a bug caused by the return value being set early to signal successfuljsing2017-04-291-5/+5
* Revert previous - we still want to do this, but I forgot about the installerbeck2017-04-292-14/+6
* We now require you to have a working libpthreadbeck2017-04-291-1/+2
* Make it safe to call SSL_library_init more than once.beck2017-04-291-5/+12
* backout previous, data_len is not always initializedotto2017-04-161-2/+5
* Use freezero(3) when cleaning up session tickets - not only does it requirejsing2017-04-141-6/+3
* Use freezero(3) to clean up the X25519 keys - simpler, cleaner code.jsing2017-04-141-6/+3
* Use freezero(3) in the CBB clean up path, since this could hold sensitivejsing2017-04-141-3/+2
* Switch i2d_SSL_SESSION() back to freezero(3) now that the size constraintsjsing2017-04-141-5/+2
* Clean up server key exchange EC point handling. Encode the point directlyjsing2017-04-141-27/+15
* Revert ssl_asn1.c r1.50 - CBB and freezero(3) do not play nicely together.jsing2017-04-111-2/+5
* Use freezero() for the internal opaque structures, instead of the currentjsing2017-04-103-18/+9
* Use freezero() for X25519 keys - same result with more readable code.jsing2017-04-101-7/+3
* freezero() the key block; simpler code and less of it.jsing2017-04-101-7/+3
* Use freezero() for i2d_SSL_SESSION() - one line of code instead of three.jsing2017-04-101-5/+2
* fix some .Xr errors that jmc@ found with mdoclint(1)schwarze2017-04-103-12/+13
* new manual page SSL_get_server_tmp_key(3)schwarze2017-04-103-2/+88
* Additional SSL_SESSION documentationschwarze2017-04-1011-16/+349
* for pure *_ctrl() wrapper macros, move the reference from ssl(3)schwarze2017-04-1014-49/+54
* new manual page SSL_CTX_set_tlsext_servername_callback(3) for SNI;schwarze2017-04-102-1/+126
* Convert various client key exchange functions to freezero(3). The memoryjsing2017-04-101-14/+5
* pasto; from <Jon dot Spillett at oracle dot com> via OpenSSL commit 3aaa1bd0schwarze2017-04-101-3/+3
* typo fix; from <Jon dot Spillett at oracle dot com>schwarze2017-04-101-5/+5
* tweak previous;jmc2017-03-291-3/+5
* Fix typo in function name;schwarze2017-03-281-4/+5
* After i wrote SSL_renegotiate(3) from scratch, OpenSSL alsoschwarze2017-03-281-12/+109
* Update RFC reference for TLSEXT_TYPE_padding.jsing2017-03-251-5/+2
* Check tls1_PRF() return value in tls1_generate_master_secret().jsing2017-03-251-4/+4
* More cleanup for tls1_PRF()/tls1_P_hash() - change the argument order ofjsing2017-03-251-46/+50
* Fewer magic numbers.jsing2017-03-181-3/+3
* t1_enc.cjsing2017-03-181-3/+2
* Currently tls1_PRF() requires that a temporary buffer be provided, thatjsing2017-03-181-50/+32
* Remove the handshake digests and related code, replacing remaining usesjsing2017-03-107-166/+45
* Switch CBB to use recallocarray() - this ensures that we do not leakjsing2017-03-101-2/+2
* First pass at cleaning up the tls1_P_hash() function - remove a pointlessjsing2017-03-101-20/+19
* Make tls1_PRF() non-static so it can be regress tested.jsing2017-03-101-2/+7
* Correctly handle TLS PRF with MD5+SHA1 - the secret has to be partitionedjsing2017-03-071-5/+26
* Clean up and simplify the tls1_PRF() implementation now that we have ajsing2017-03-061-48/+19
* Correctly convert an SSLv2 challenge into an SSLv3/TLS client random byjsing2017-03-051-9/+27
* Provide a rolling handshake hash that commences as soon as the cipherjsing2017-03-058-54/+193
* Convert various handshake message generation functions to CBB.jsing2017-03-054-56/+113
* Drop the second argument of dtls1_set_message_header() and make it a voidjsing2017-03-043-13/+10
* Call ssl3_handshake_write() instead of ssl3_do_write() - this was missedjsing2017-03-041-2/+2
* Convert ssl3_{get,send}_server_key_exchange() to EVP_md5_sha1().jsing2017-03-013-44/+29
* Bump minors due to symbol addition.jsing2017-02-281-1/+1
* Stop pretending that MD5 and SHA1 might not exist - rather than locatingjsing2017-02-284-20/+8