summaryrefslogtreecommitdiffstats
path: root/lib/libssl/src/ssl (follow)
Commit message (Expand)AuthorAgeFilesLines
* Remove more compression related code.jsing2014-07-103-20/+3
* Put back some parts of the public SSL API that should not have beenjsing2014-07-103-4/+28
* decompress libssl. ok beck jsingtedu2014-07-1025-758/+39
* KNF comments, reflowing and moving out of the middle of argument lists inguenther2014-07-103-93/+150
* remove unused ecc_pkey_size.bcook2014-07-101-4/+2
* Remove leading underscore from _BYTE_ORDER and _{LITTLE,BIG}_ENDIAN, to bemiod2014-07-091-2/+2
* Clean up and simplify SSL_CIPHER_description by always using asprintf. Ifjsing2014-07-091-54/+54
* tedu the SSL export cipher handling - since we do not have enabled exportjsing2014-07-0911-385/+48
* remove unused, private version strings except SSL_version_strbcook2014-07-093-8/+3
* Mark the weakened 40-bit export ciphers as invalid - no one in their rightjsing2014-07-081-9/+9
* Remove SSL_FIPS.jsing2014-07-083-94/+86
* Nuke SSL_NOT_EXP since it does nothing.jsing2014-07-082-126/+125
* pedantic avoidance of division by zero, likely not actuallybeck2014-07-081-1/+6
* Memory leak in error path of the day, from clang via dhill@bitrig;miod2014-07-021-2/+3
* fix the identical leak in three different files.tedu2014-06-303-6/+9
* More KNF.jsing2014-06-291-32/+49
* Fix 2 memory leaks.logan2014-06-281-1/+3
* KNF, particularly wrapped lines of calls to PEM_read_bio_FOO() andguenther2014-06-221-24/+44
* always compare memcmp against 0, for clarity.tedu2014-06-213-7/+7
* Pull the code that builds a DTLS sequence number out into its own functionjsing2014-06-213-23/+29
* Specify the correct strength bits for 3DES cipher suites.jsing2014-06-211-15/+13
* Pull out the sequence number selection and handle this up front. Also, thejsing2014-06-211-9/+6
* More KNF and clean up.jsing2014-06-211-13/+9
* Fix memory leak in error path.logan2014-06-211-2/+2
* convert CRYPTO_memcmp to timingsafe_memcmp based on current policy favoringtedu2014-06-199-22/+22
* In ssl3_send_newsession_ticket(), fix a memory leak in an error path.miod2014-06-181-2/+4
* Missinc calloc() return value check; ok deraadt@miod2014-06-181-1/+5
* Make sure to always invoke EVP_CIPHER_CTX_cleanup() before returning in themiod2014-06-181-4/+10
* Use asprintf() instead of a fixed 128-byte size in SSL_CIPHER_description()miod2014-06-181-11/+11
* In SSL_COMP_add_compression_method(), make sure error cases actually returnmiod2014-06-181-2/+2
* ssl_session_cmp is not a sort function, can use CRYPTO_memcmp here too.tedu2014-06-171-2/+4
* Rename ssl3_record_sequence_update() to ssl3_record_sequence_increment(),jsing2014-06-154-29/+16
* Correctly calculate the key block length when using export ciphers.jsing2014-06-131-1/+5
* Overhaul the keyblock handling in ssl3_change_cipher_state(). Usejsing2014-06-131-32/+45
* Correctly calculate the key block length when used with export ciphers.jsing2014-06-131-17/+24
* Use meaningful variable names, rather than i, j, k and cl.jsing2014-06-131-23/+27
* Do not bother trying to work out of we can reuse a cipher context - justjsing2014-06-131-22/+12
* Separate the comression handling from the cipher/message digest handling injsing2014-06-131-43/+47
* Swap compress/expand around so they are in the correct order - these endedjsing2014-06-131-14/+14
* The export_key/export_iv variables are only used in the is_export case.jsing2014-06-131-7/+10
* Rename a bunch of variables in ssl3_change_cipher_state() for readability.jsing2014-06-131-38/+40
* Add ChaCha20-Poly1305 based ciphersuites.jsing2014-06-135-7/+81
* Switch the AES-GCM cipher suites to SSL_CIPHER_ALGORITHM2_AEAD.jsing2014-06-131-21/+68
* Combine the MAC handling for both !EVP_CIPH_FLAG_AEAD_CIPHER andjsing2014-06-131-14/+11
* Use SSL3_SEQUENCE_SIZE and if we're going to preincrement we may as welljsing2014-06-131-4/+3
* Add support for handling SSL_CIPHER_ALGORITHM2_AEAD ciphers, which arejsing2014-06-134-33/+249
* Add an SSL_AEAD_CTX to enable the use of EVP_AEAD with an SSL cipher.jsing2014-06-134-4/+49
* Remove support for the `opaque PRF input' extension, which draft has expiredmiod2014-06-139-323/+11
* tags as requested by miod and teduderaadt2014-06-1249-48/+50
* Stop setting the EVP_MD_CTX_FLAG_NON_FIPS_ALLOW - it has been ignored sincejsing2014-06-114-9/+0