summaryrefslogtreecommitdiff
path: root/ssl
Commit message (Expand)AuthorAgeFilesLines
* Improve some error messages if a digest is not availableMatt Caswell2020-08-293-2/+9
* Ensure libssl creates libctx aware MAC keysMatt Caswell2020-08-293-13/+29
* apps: -msg flag enhancement 2/2Marc2020-08-272-5/+9
* Fix coverity CID #1465795 - Incorrect free deallocator used in SSL_add1_host()Shane Lontis2020-08-241-1/+1
* Appease -Werror=stringop-overflow=Patrick Steuer2020-08-131-3/+2
* Avoid segfault in SSL_export_keying_material if there is no sessionTomas Mraz2020-08-131-1/+2
* Mark SSL_CTX_set_ssl_version() as deprecated in 3.0Benjamin Kaduk2020-08-121-0/+2
* Add EVP signature with libctx methods.Shane Lontis2020-08-096-21/+27
* rand_drbg: remove RAND_DRBG.Pauli2020-08-071-1/+0
* Update copyright yearMatt Caswell2020-08-061-1/+1
* Disallow setting more than one IP address with SSL_add1_host()David Woodhouse2020-08-031-2/+21
* Make SSL_set1_host() and SSL_add1_host() take IP addressesDavid Woodhouse2020-08-031-0/+10
* unify spelling of serializePauli2020-07-301-1/+1
* Add X509 related libctx changes.Shane Lontis2020-07-248-77/+147
* Avoid errors with a priori inapplicable protocol boundsViktor Dukhovni2020-07-212-15/+26
* Update copyright yearRichard Levitte2020-07-162-2/+2
* Revert "kdf: make function naming consistent."Matt Caswell2020-07-162-15/+15
* Revert "The EVP_MAC functions have been renamed for consistency. The EVP_MAC...Matt Caswell2020-07-162-7/+7
* deprecate engines in SSLPauli2020-07-164-0/+12
* Add SSL_get[01]_peer_certificate()Todd Short2020-07-163-13/+14
* Providerized libssl fallout: cleanup initBenjamin Kaduk2020-07-111-61/+0
* Fix an incorrect error flow in add_provider_groupsMatt Caswell2020-07-081-1/+1
* Add support to zeroize plaintext in S3 record layerMartin Elshuber2020-07-073-0/+10
* Ensure TLS padding is added during encryption on the provider sideMatt Caswell2020-07-061-4/+16
* Convert SSLv3 handling to use provider side CBC/MAC removalMatt Caswell2020-07-064-46/+97
* Make libssl start using the TLS provider CBC supportMatt Caswell2020-07-062-50/+141
* Add provider support for TLS CBC padding and MAC removalMatt Caswell2020-07-061-0/+2
* Remove SSL dependencies from tls_pad.cMatt Caswell2020-07-063-77/+135
* Split the padding/mac removal functions out into a separate fileMatt Caswell2020-07-063-270/+283
* Move MAC removal responsibility to the various protocol "enc" functionsMatt Caswell2020-07-068-400/+375
* SSL: fix misuse of ERR_LIB_SYSRichard Levitte2020-07-051-1/+2
* Fix many MarkDown issues in {NOTES*,README*,HACKING,LICENSE}.md filesDr. David von Oheimb2020-07-052-79/+78
* Rename NOTES*, README*, VERSION, HACKING, LICENSE to .md or .txtDr. David von Oheimb2020-07-052-0/+0
* Free pre_proc_exts in SSL_free()MiƂosz Kaniewski2020-07-011-0/+2
* Reduce the security bits for MD5 and SHA1 based signatures in TLSKurt Roeckx2020-06-271-0/+18
* Don't attempt to duplicate the BIO state in SSL_dupMatt Caswell2020-06-231-15/+0
* Ensure that SSL_dup copies the min/max protocol versionMatt Caswell2020-06-231-0/+2
* Fix the DTLS1_COOKIE_LENGTH valueMatt Caswell2020-06-191-1/+1
* Create defines for TLS Group IdsMatt Caswell2020-06-191-35/+36
* Don't send supported groups if no-ec and we're doing DTLSMatt Caswell2020-06-191-1/+1
* Provider a better error message if we fail to copy parametersMatt Caswell2020-06-193-3/+5
* Update the various SSL group getting and setting functionsMatt Caswell2020-06-194-48/+78
* Modify libssl to discover supported groups based on available providersMatt Caswell2020-06-196-184/+341
* The EVP_MAC functions have been renamed for consistency. The EVP_MAC_CTX_*Pauli2020-06-112-7/+7
* kdf: make function naming consistent.Pauli2020-06-112-15/+15
* Do not allow dropping Extended Master Secret extension on renegotiatonTomas Mraz2020-06-091-1/+14
* use safe primes in ssl_get_auto_dh()Hubert Kario2020-06-091-36/+38
* TLSv1.3: additional checks in SSL_set_record_padding_callbackVadim Fedorenko2020-06-081-2/+9
* TLSv13: add kTLS supportVadim Fedorenko2020-06-082-14/+72
* kTLS: add support for AES_CCM128 and AES_GCM256Vadim Fedorenko2020-06-081-26/+24