summaryrefslogtreecommitdiff
path: root/src/lib (follow)
Commit message (Expand)AuthorAgeFilesLines
* fold the contents of malloc.conf.5 into malloc.3 and sysctl.2,jmc2018-11-211-6/+118
* Introducing malloc_usable_size() was a mistake. While some otherotto2018-11-212-105/+5
* Saw a mention somewhere a while back that the gotdata() function inderaadt2018-11-205-144/+27
* Fix compilation on alpha, where DEF_WEAK() really must be paired withguenther2018-11-191-2/+1
* Revert previous - DTLSv1 uses MD5+SHA1 for RSA signature verification.jsing2018-11-192-10/+4
* Revert previous - the default sigalg for RSA key exchange is {sha1,rsa}.jsing2018-11-191-4/+4
* Implement malloc_usable_size(); ok millert@ deraadt@ and jmc@ for the man pageotto2018-11-182-6/+108
* Fix DTLS, because DTLS still remains a special flower, allows regress to passbeck2018-11-172-4/+10
* Fix whitespace around assignment operators.tb2018-11-171-7/+7
* revert previousbeck2018-11-161-5/+3
* Fix DTLS. Because the DTLS code is strange. I am really coming around tobeck2018-11-161-3/+5
* Unbreak legacy ciphers for prior to 1.1 by setting having a legacybeck2018-11-164-10/+22
* Port OpenSSL commit 99540ec79491f59ed8b46b4edf130e17dc907f52 -- mitigationtb2018-11-151-4/+4
* Fix wrong sizeof argument by using 'uint16_t *', with minor nit from tb@,mestre2018-11-141-2/+2
* In TLS1.2 we use evp_sha1 if we fall back this far, not evp_md5_sha1 as in 1.1beck2018-11-141-2/+2
* Temporary workaround for breakage seen in www.videolan.org with curve mismatchbeck2018-11-131-3/+4
* NULL out mdctx to prevent possible double free introduced in version 1.4beck2018-11-131-1/+2
* Fix pkey_ok to be less strange, and add cuve checks required for the EC onesbeck2018-11-131-9/+26
* Missing initialization for pub_key. CID 184303.tb2018-11-121-2/+2
* Add check function to verify that pkey is usable with a sigalg.beck2018-11-114-7/+24
* Add back a few missing compatibility stubsbcook2018-11-112-4/+37
* quiet warning on other compilersbcook2018-11-111-3/+3
* Add EVP_sm3() to OpenSSL_add_all_digests_internal().tb2018-11-111-1/+4
* bump minors after symbol addition.tb2018-11-113-3/+3
* Add SSL_set1_host(), a thin wrapper around X509_VERIFY_PARAM_set1_host().tb2018-11-113-2/+10
* Add Ribose Inc's implementation of the SM3 hashing function withtb2018-11-118-3/+437
* Nuke trailing whitespacebeck2018-11-111-6/+6
* Add automatic threading initialization for libcrypto.bcook2018-11-116-452/+140
* Free the server tls transcript in case session reuse did not work.bluhm2018-11-111-3/+4
* include crypto.h from the correct path, remove unused variablebcook2018-11-111-5/+2
* Add support for RSA PSS algorithims being used in sigalgs.beck2018-11-112-2/+29
* Convert signatures and verifcation to use the EVP_DigestXXX apibeck2018-11-113-45/+93
* Remove dead codebeck2018-11-102-16/+2
* Tweak and improve the TLSv1.3 state machine.jsing2018-11-101-24/+46
* Avoid a double allocation and memory leak.jsing2018-11-101-4/+2
* Stop keeping track of sigalgs by guessing it from digest and pkey,beck2018-11-108-92/+102
* Use TLS13_HS_{CLIENT,SERVER} instead of using a redundant _SEND{,S}.tb2018-11-101-30/+28
* Fix last of the empty hash nonsensebeck2018-11-101-26/+3
* Fix the TLSv1.3 key schedule implementation.jsing2018-11-092-66/+95
* Use "send" and "recv" consistently instead of mixing them with "read"tb2018-11-091-98/+108
* Initialize priv_key and pub_key on first use instead of at the top.tb2018-11-091-6/+4
* Initialize priv_key and pub_key on first use instead of at the top.tb2018-11-091-4/+4
* Avoid dereferencing eckey before checking it for NULL.tb2018-11-091-5/+6
* Remove ethers(5) YP support bits from libc as it makes it difficult tobrynet2018-11-092-70/+8
* Ensure we free the handshake transcript upon session resumption.jsing2018-11-091-1/+4
* Ensure we only choose sigalgs from our prefernce list, not the whole listbeck2018-11-094-10/+19
* Add the ability to have a separate priority list for sigalgs.beck2018-11-094-12/+43
* Correct defines for writer tests in connect/accept loops.jsing2018-11-091-3/+3
* Correct function naming for tls13_handshake_advance_state_machine().jsing2018-11-091-4/+2
* Avoid leak: free existing SRTP connection profiles beforetb2018-11-091-1/+2