summaryrefslogtreecommitdiffstats
path: root/lib/libssl/t1_enc.c (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Sort and group includes.jsing2014-11-161-1/+3
* Use arc4random_buf() instead of RAND_bytes() or RAND_pseudo_bytes().jsing2014-10-181-4/+3
* Typical malloc() with size multiplication to reallocarray().doug2014-10-181-4/+4
* Oops, revert changes commited by mistake. The previous commit was supposedmiod2014-08-071-4/+3
* When you expect a function to return a particular value, don't put a commentmiod2014-08-071-3/+4
* Remove more compression related code.jsing2014-07-101-8/+1
* decompress libssl. ok beck jsingtedu2014-07-101-44/+1
* tedu the SSL export cipher handling - since we do not have enabled exportjsing2014-07-091-63/+1
* pedantic avoidance of division by zero, likely not actuallybeck2014-07-081-1/+6
* Pull the code that builds a DTLS sequence number out into its own functionjsing2014-06-211-20/+10
* Pull out the sequence number selection and handle this up front. Also, thejsing2014-06-211-9/+6
* More KNF and clean up.jsing2014-06-211-13/+9
* Rename ssl3_record_sequence_update() to ssl3_record_sequence_increment(),jsing2014-06-151-19/+5
* Correctly calculate the key block length when using export ciphers.jsing2014-06-131-1/+5
* Swap compress/expand around so they are in the correct order - these endedjsing2014-06-131-14/+14
* Combine the MAC handling for both !EVP_CIPH_FLAG_AEAD_CIPHER andjsing2014-06-131-14/+11
* Add support for handling SSL_CIPHER_ALGORITHM2_AEAD ciphers, which arejsing2014-06-131-27/+238
* Remove support for the `opaque PRF input' extension, which draft has expiredmiod2014-06-131-18/+1
* tags as requested by miod and teduderaadt2014-06-121-1/+1
* Stop setting the EVP_MD_CTX_FLAG_NON_FIPS_ALLOW - it has been ignored sincejsing2014-06-111-2/+0
* In tls1_cert_verify_mac(), check the return value of EVP_MD_CTX_copy_ex()jsing2014-06-101-3/+5
* Add a define for the SSLv3 sequence size and use it, rather than sprinklingjsing2014-06-081-2/+2
* Be explicit with types. No binary change.jsing2014-06-081-3/+3
* Factor out the part of tls1_change_cipher_state() that is specific tojsing2014-06-081-126/+153
* Factor out the sequence number reset code to aid in upcoming changes.jsing2014-06-081-8/+10
* Add missing NULL check after calling EVP_PKEY_new_mac_key().jsing2014-06-071-0/+2
* Use !is_read to imply SSL3_CC_WRITE.jsing2014-06-071-3/+2
* Move the export label initialisation into the export handling code, sincejsing2014-06-071-6/+11
* Remove pointless casts - no binary change.jsing2014-06-071-2/+2
* Rename variables to make it clear that these are only used in the exportjsing2014-06-071-15/+18
* Further clean up of context handling in tls1_change_cipher_state().jsing2014-06-071-21/+17
* Rename more variables for readability and consistency.jsing2014-06-021-25/+25
* Overhaul the key block handling in tls1_change_cipher_state() - usejsing2014-06-011-46/+66
* In tls1_setup_key_block(), use the correct IV length for GCM mode, whichjsing2014-06-011-17/+24
* Clean up the tls1_change_cipher_state() key length handling and use ajsing2014-06-011-10/+12
* remove some #if 0 code. we don't need any more reminders that we're usingtedu2014-05-301-4/+0
* Make use of SSL_IS_DTLS, SSL_USE_EXPLICIT_IV, SSL_USE_SIGALGS andjsing2014-05-301-8/+5
* Fix another two cases where the return value of ssl_replace_hash() isjsing2014-05-291-8/+18
* More KNF.jsing2014-05-281-11/+12
* Refactor tls1_change_cipher_state() and split the compression handling outjsing2014-05-281-32/+44
* There is no point in checking if a pointer is non-NULL before calling free,jsing2014-05-281-4/+2
* Remove TLS_DEBUG, SSL_DEBUG, CIPHER_DEBUG and OPENSSL_RI_DEBUG. Much ofjsing2014-05-251-46/+0
* The ssl_ciper_get_evp() function is currently overloaded to also return thejsing2014-05-251-3/+10
* Invoke OPENSSL_cleanse() with the size of the variable you are cleaning.miod2014-05-241-1/+1
* KSSL is dead... nuke KSSL_DEBUG from orbit.jsing2014-05-201-83/+0
* use the correct algorithm mask. reported by satish lvr viatedu2014-04-281-1/+1
* more malloc/realloc/calloc cleanups; ok beck kettenisderaadt2014-04-211-2/+2
* Chop off more SSLv2 tentacles and start fixing and noting y2038 issues.guenther2014-04-201-1/+0
* More KNF.jsing2014-04-191-31/+36
* now that knf carpet bombing is finished, switch to hand to hand combat.tedu2014-04-181-82/+75