summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
* remove excessive brackets on pointer mathderaadt2015-09-281-8/+8
* Redo 1.25, without the NULL deref.miod2015-09-271-22/+31
* bump to 2.3.1bcook2015-09-271-3/+3
* Use ASN1_item_dup() instead of ASN1_dup().jsing2015-09-262-7/+5
* We don't need no stinking "EXAMPLE OF THE DSA" or README (the credits arejsing2015-09-262-126/+0
* typos in documentation; better wording, suggested by jmc@libressl-v2.3.0sobrado2015-09-2225-43/+43
* avoid void * pointer arithmeticbcook2015-09-181-2/+2
* Revert bn_print.c:r1.25 ("handle negative-zero in BN_bn2dec() too") forsthen2015-09-181-31/+22
* Remove more EVP_sha() SHA-0 references.bcook2015-09-171-2/+2
* Re-add missing comma from SHA-0 removal which breaks mlinks generation.sthen2015-09-171-1/+1
* include stdint.h for uint64_tbcook2015-09-171-1/+2
* Add support for disabling certificate and CRL validity checking.jsing2015-09-142-11/+15
* delete bogus trailing .Ns from SYNOPSIS .Ft macrosschwarze2015-09-142-12/+12
* fix formatting by adding the required quotes to .Fa in the SYNOPSISschwarze2015-09-144-22/+22
* Remove useless quoting from .Fo and .Fn function names, to preventschwarze2015-09-142-6/+6
* Temporarily revive MD4 for MS CHAP support.doug2015-09-1416-23/+666
* Crank major version due to removal of SHA-0 and MD4 from libcrypto.doug2015-09-132-4/+4
* Remove MD4 support from LibreSSL.doug2015-09-1316-666/+23
* Remove SHA-0 support.doug2015-09-1310-323/+16
* Since a major bump of libcrypto is coming, remove OPENSSL_ia32cap andmiod2015-09-132-17/+2
* Handle negative-zero in BN_bn2dec() too, just like in BN_print().deraadt2015-09-131-22/+31
* Reorder functions for readability/consistency.jsing2015-09-131-235/+228
* BN does support negative-zero -- BN_print() sets the standard here.deraadt2015-09-131-3/+3
* Only check for key truncation if no KDF function is being used.jsing2015-09-131-4/+4
* Stop generating private keys in a network buffer.jsing2015-09-132-58/+58
* Use ECDH_size() instead of rolling our own.jsing2015-09-134-24/+22
* Switch to miod's shiny new OPENSSL_cpu_caps() and we can now also enablejsing2015-09-132-6/+6
* Merge ech_ossl.c into ech_key.c - not much point having one file with ajsing2015-09-132-215/+146
* Nuke openssl/e_os2.h, since nothing should be using it.jsing2015-09-131-84/+0
* Provide ECDH_size().jsing2015-09-133-4/+11
* Check ECDH output buffer length and avoid truncation.jsing2015-09-133-6/+16
* Lob a style(9) grenade in here.jsing2015-09-136-181/+176
* Mechanical minor bump to follow libcrypto.miod2015-09-132-2/+2
* Add a new interface, OPENSSL_cpu_caps(), to return the currently runningmiod2015-09-132-2/+17
* The *_accept() functions increment in_handshake at the start of the function,jsing2015-09-134-38/+60
* If we have hardware acceleration for AES, prefer AES as a symmetric cipherjsing2015-09-132-14/+60
* Split ssl3_send_client_key_exchange() (387 lines of code) into fivejsing2015-09-122-654/+702
* Fix function name.jsing2015-09-122-4/+4
* Sync handling of cached record digests with s3_srvr.c.jsing2015-09-122-2/+46
* explicit_bzero() the GOST premaster secret.jsing2015-09-122-4/+14
* Unwrap a bunch of lines.jsing2015-09-122-74/+38
* Remove most of the SSLv3 version checks and a few TLS v1.0.doug2015-09-1214-236/+114
* Uncopy and unpaste dtls1_send_newsession_ticket() - another 111 lines ofjsing2015-09-124-222/+6
* Move handshake message header length determination into a separatejsing2015-09-128-46/+54
* Uncopy and unpaste dtls1_send_certificate_request() - removes another 80jsing2015-09-124-160/+6
* Uncopy and unpaste dtls1_send_server_key_exchange(). Removes another 329jsing2015-09-124-658/+6
* Uncopy and unpaste dtls1_send_server_done().jsing2015-09-124-36/+6
* Uncopy and unpaste dtls1_send_server_hello().jsing2015-09-124-136/+6
* Uncopy and unpaste dtls1_send_hello_request().jsing2015-09-124-36/+6
* Convert the rest of the server handshake functions to ssl3_handshake_msg_*.jsing2015-09-122-88/+70