summaryrefslogtreecommitdiff
path: root/ssl
Commit message (Expand)AuthorAgeFilesLines
* Following the previous 2 commits also move ecpointformats out of sessionMatt Caswell2019-06-188-42/+25
* Fix a race condition in ciphers handlingMatt Caswell2019-06-184-22/+14
* Fix a race condition in supported groups handlingMatt Caswell2019-06-185-24/+16
* Fix no-ec with no-dhMatt Caswell2019-06-173-16/+45
* Allow TLSv1.3 in a no-ec buildMatt Caswell2019-06-179-118/+157
* Fix no-dhMatt Caswell2019-06-131-1/+3
* TLS1.3 FFDHE Supportraja-ashok2019-06-125-82/+192
* Make EVP_MD_CTX_ctrl() work for legacy use cases (ssl3).Shane Lontis2019-06-112-16/+19
* Change cipher default strings to a functionTodd Short2019-06-112-5/+29
* Coverity fixesShane Lontis2019-06-061-0/+1
* Move digests to providersShane Lontis2019-06-043-14/+37
* Defer sending a KeyUpdate until after pending writes are completeMatt Caswell2019-06-034-17/+9
* issue-8998: Ensure that the alert is generated and reaches the remoteagnosticdev2019-05-301-2/+1
* Changed ssl layer to use EVP_KDF API for TLS1_PRF and HKDF.David Makepeace2019-05-272-38/+42
* Update format string for ciphers to account for newer ciphersDaniƫl van Eeden2019-05-271-1/+1
* Change SSL parameter SSL_session_reused constArne Schwabe2019-05-211-1/+1
* ssl: Add SSL_sendfileBoris Pismenny2019-05-072-0/+68
* Fix no-srpMatt Caswell2019-05-011-4/+1
* Structure alignment macro.Pauli2019-05-011-2/+2
* Collapse ssl3_state_st (s3) into ssl_stTodd Short2019-04-2924-881/+866
* Fix error in BIO_get_ktls_send() and BIO_get_ktls_recv()Matt Caswell2019-04-251-2/+2
* Check if num is 0 before trying to malloc memory. Otherwise for client hellos...dyrock2019-04-191-0/+5
* Fix typosJakub Wilk2019-04-101-1/+1
* ssl: Linux TLS Rx OffloadBoris Pismenny2019-04-013-20/+124
* Remove heartbeats completelyRichard Levitte2019-03-294-19/+3
* conn_is_closed should return 1 if get_last_sys_error is WSAECONNRESETPaul Monson2019-03-281-0/+4
* constify *_dup() and *i2d_*() and related functions as far as possible, intro...David von Oheimb2019-03-063-8/+8
* Adapt OPENSSL_INIT_DEBUG to the new generic trace APIRichard Levitte2019-03-061-24/+9
* Adapt CIPHER_DEBUG to the new generic trace APIRichard Levitte2019-03-064-48/+57
* Adapt SSL_DEBUG to the new generic trace APIRichard Levitte2019-03-064-123/+73
* Don't write the tick_identity to the sessionMatt Caswell2019-03-055-25/+33
* Don't restrict the number of KeyUpdate messages we can processMatt Caswell2019-02-223-12/+0
* Don't interleave handshake and other record types in TLSv1.3Matt Caswell2019-02-192-1/+11
* Add option to disable Extended Master SecretTodd Short2019-02-154-3/+11
* Don't signal SSL_CB_HANDSHAKE_START for TLSv1.3 post-handshake messagesMatt Caswell2019-02-143-24/+12
* Ignore cipher suites when setting cipher listSam Roberts2019-02-141-2/+22
* Make some simple getters take const SSL/SSL_CTXSam Roberts2019-02-051-10/+10
* Fix end-point shared secret for DTLS/SCTPMichael Tuexen2019-02-012-4/+28
* add an additional async notification communication method based on callbackPing Yu2019-01-272-0/+56
* Revert "Keep the DTLS timer running after the end of the handshake if appropr...Matt Caswell2019-01-242-31/+0
* Don't get the mac type in TLSv1.3Matt Caswell2019-01-151-3/+1
* Add missing entries in ssl_mac_pkey_idMatt Caswell2019-01-151-0/+2
* Don't artificially limit the size of the ClientHelloMatt Caswell2019-01-081-7/+0
* More configurable crypto and ssl library initializationViktor Dukhovni2019-01-071-6/+7
* Don't complain if we receive the cryptopro extension in the ClientHelloMatt Caswell2019-01-071-2/+4
* Restore compatibility with GOST2001 implementations.Dmitry Belyavskiy2019-01-061-1/+6
* Fix a RUN_ONCE bugMatt Caswell2019-01-041-2/+4
* Eliminate unused buffers from ssl3_change_cipher_stateDmitry Belyavskiy2019-01-031-6/+0
* Remove unused variables from tls1_change_cipher_stateDmitry Belyavskiy2019-01-031-12/+0
* Fix a minor nit in the hkdflabel sizeBernd Edlinger2018-12-301-1/+1