summaryrefslogtreecommitdiff
path: root/src/lib (follow)
Commit message (Expand)AuthorAgeFilesLines
* Remove SHA-0 support.doug2015-09-1321-649/+35
* For now, permit overriding of the malloc family, to make emacs happyguenther2015-09-131-6/+6
* Since a major bump of libcrypto is coming, remove OPENSSL_ia32cap andmiod2015-09-134-34/+4
* Handle negative-zero in BN_bn2dec() too, just like in BN_print().deraadt2015-09-132-44/+62
* Reorder functions for readability/consistency.jsing2015-09-132-470/+456
* BN does support negative-zero -- BN_print() sets the standard here.deraadt2015-09-132-6/+6
* work around the stupid semantics of SSL_read and SSL_write to make surebeck2015-09-131-3/+3
* Wrap <pwd.h> so that calls go direct and the symbols are all weak.guenther2015-09-132-7/+8
* Overshot w/PROTO_DEPRECATED: seed48_deterministic() is used internallyguenther2015-09-131-1/+2
* Only check for key truncation if no KDF function is being used.jsing2015-09-132-8/+8
* Don't leak conninfo - spotted by marko kreen.beck2015-09-131-2/+3
* Stop generating private keys in a network buffer.jsing2015-09-132-58/+58
* The number of rounds is just two digits in the salt. We've alreadymillert2015-09-131-2/+2
* Use ECDH_size() instead of rolling our own.jsing2015-09-134-24/+22
* Switch to miod's shiny new OPENSSL_cpu_caps() and we can now also enablejsing2015-09-132-6/+6
* Merge ech_ossl.c into ech_key.c - not much point having one file with ajsing2015-09-135-432/+294
* Nuke openssl/e_os2.h, since nothing should be using it.jsing2015-09-132-86/+1
* Provide ECDH_size().jsing2015-09-136-8/+22
* Check ECDH output buffer length and avoid truncation.jsing2015-09-136-12/+32
* Add Certplus CA root certificate:sthen2015-09-131-0/+86
* Lob a style(9) grenade in here.jsing2015-09-1312-362/+352
* Mechanical minor bump to follow libcrypto.miod2015-09-133-3/+3
* add visibility of ciper and connection version stringsbeck2015-09-134-6/+56
* Add a new interface, OPENSSL_cpu_caps(), to return the currently runningmiod2015-09-136-6/+36
* The *_accept() functions increment in_handshake at the start of the function,jsing2015-09-134-38/+60
* If we have hardware acceleration for AES, prefer AES as a symmetric cipherjsing2015-09-132-14/+60
* Wrap <stdlib.h> so that calls go direct and the symbols not in theguenther2015-09-1322-26/+54
* Move connection info into it's own private structure allocated and filled inbeck2015-09-127-120/+208
* Split ssl3_send_client_key_exchange() (387 lines of code) into fivejsing2015-09-122-654/+702
* Fix function name.jsing2015-09-122-4/+4
* Sync handling of cached record digests with s3_srvr.c.jsing2015-09-122-2/+46
* explicit_bzero() the GOST premaster secret.jsing2015-09-122-4/+14
* Ensure that we clear the libssl error stack before we make a function calljsing2015-09-123-5/+12
* Unwrap a bunch of lines.jsing2015-09-122-74/+38
* __strsignal() is now declared in hidden/signal.hguenther2015-09-121-2/+0
* Put tls_peer_cert* functions in the same place.jsing2015-09-121-6/+6
* Wrap <inttypes.h> and finish wrapping of <wchar.h> so that calls go directguenther2015-09-1224-24/+51
* Remove most of the SSLv3 version checks and a few TLS v1.0.doug2015-09-1214-236/+114
* Uncopy and unpaste dtls1_send_newsession_ticket() - another 111 lines ofjsing2015-09-124-222/+6
* Move handshake message header length determination into a separatejsing2015-09-128-46/+54
* Wrap <unistd.h> so that internal calls go direct and they're all weak symbolsguenther2015-09-126-4/+12
* Wrap <getopt.h> to make the functions weak and make access to the initializedguenther2015-09-121-1/+6
* Uncopy and unpaste dtls1_send_certificate_request() - removes another 80jsing2015-09-124-160/+6
* Uncopy and unpaste dtls1_send_server_key_exchange(). Removes another 329jsing2015-09-124-658/+6
* Uncopy and unpaste dtls1_send_server_done().jsing2015-09-124-36/+6
* Uncopy and unpaste dtls1_send_server_hello().jsing2015-09-124-136/+6
* Uncopy and unpaste dtls1_send_hello_request().jsing2015-09-124-36/+6
* Convert the rest of the server handshake functions to ssl3_handshake_msg_*.jsing2015-09-122-88/+70
* Uncopy and unpaste dtls1_send_client_verify() - thejsing2015-09-124-148/+6
* Uncopy and unpaste dtls1_send_client_key_exchange() - thejsing2015-09-124-538/+10