summaryrefslogtreecommitdiff
path: root/ssl/s3_lib.c
Commit message (Expand)AuthorAgeFilesLines
* first cut at sigalg loadingMichael Baentsch2023-02-241-3/+5
* Resolve a TODO in ssl3_dispatch_alertMatt Caswell2022-11-141-5/+5
* Remove some redundant codeMatt Caswell2022-10-201-2/+0
* Partial revert and reimplement "Enable brainpool curves for TLS1.3"Matt Caswell2022-10-071-4/+1
* Move the SSLv3 crypto code into the new record layerMatt Caswell2022-10-051-2/+2
* Stop raising ERR_R_MALLOC_FAILURE in most placesRichard Levitte2022-10-051-8/+8
* ssl: modify libssl so that it uses OSSL_TIMEPauli2022-09-131-2/+2
* SSL object refactoring using SSL_CONNECTION objectTomas Mraz2022-07-281-192/+250
* Check for EVP_MD being NULL inside ssl.slontis2022-07-131-2/+3
* Fix the erroneous checks of EVP_PKEY_CTX_set_group_namePeiwei Hu2022-06-021-2/+2
* Update copyright yearMatt Caswell2022-05-031-1/+1
* Add SSL_(CTX_)?get0_(verify|chain)_cert_store functionsHugo Landau2022-04-061-0/+12
* [ssl] Prefer SSL_k(EC)?DHE to the SSL_kE(EC)?DH aliasNicola Tuveri2022-03-011-6/+6
* add SSL_get0_iana_groups() & SSL_client_hello_get_extension_order()Phus Lu2022-02-031-0/+8
* add OSSL_STACK_OF_X509_free() for commonly used patternDr. David von Oheimb2021-12-211-1/+1
* Don't free the EVP_PKEY on error in set0_tmp_dh_pkey() functionsMatt Caswell2021-12-071-2/+10
* Enable brainpool curves for TLS1.3Bernd Edlinger2021-11-261-1/+4
* tls/ccm8: reduce the cipher strength for CCM8 ciphers to 64 bitsPauli2021-09-241-11/+11
* doc: document the change to the security level of CCM8 cipher suitesPauli2021-09-241-11/+11
* tls: reduce the strength of CCM_8 ciphers due to their short IV.Pauli2021-09-241-22/+22
* Change TLS RC4 cipher strength check to be data driven.slontis2021-09-231-10/+10
* ssl: add zero strenght arguments to BN and RAND RNG callsPauli2021-05-291-2/+2
* Promote SSL_get_negotiated_group() for non-TLSv1.3Benjamin Kaduk2021-05-151-2/+9
* OBJ_nid2sn(NID_sha256) is completely equivalent to OSSL_DIGEST_NAME_SHA2_256Tomas Mraz2021-04-011-5/+1
* Ensure buffer/length pairs are always in syncMatt Caswell2021-03-251-1/+4
* ssl: support params arguments to init functionsPauli2021-03-121-2/+2
* Deprecate the libssl level SRP APIsMatt Caswell2021-02-121-2/+2
* Remove all OPENSSL_NO_XXX from libssl where XXX is a crypto algMatt Caswell2021-02-051-19/+3
* Remove OPENSSL_NO_EC guards from libsslMatt Caswell2021-02-051-8/+4
* Remove compile time guard checking from ssl3_get_req_cert_typeMatt Caswell2021-02-051-9/+4
* Remove OPENSSL_NO_DH guards from libsslMatt Caswell2021-02-051-25/+7
* Remove some TODO(OpenSSL1.2) referencesMatt Caswell2021-02-041-1/+0
* Update copyright yearRichard Levitte2021-01-281-1/+1
* Avoid using OSSL_PKEY_PARAM_GROUP_NAME when the key might be legacyTomas Mraz2021-01-261-41/+4
* Deprecate EC_KEY + Update ec apps to use EVP_PKEYShane Lontis2021-01-261-26/+41
* Adding TLS group name retrievalMichael Baentsch2021-01-081-0/+18
* Drop OPENSSL_NO_RSA everywhereRichard Levitte2020-12-201-4/+0
* Return sensible values for some SSL ctrlsMatt Caswell2020-11-181-6/+5
* Only disabled what we need to in a no-dh buildMatt Caswell2020-11-181-3/+1
* Implement a replacement for SSL_set_tmp_dh()Matt Caswell2020-11-181-18/+2
* Deprecate SSL_CTRL_SET_TMP_DH and other related ctrlsMatt Caswell2020-11-181-25/+10
* SSL: refactor all SSLfatal() callsRichard Levitte2020-11-111-36/+18
* Convert all {NAME}err() in ssl/ to their corresponding ERR_raise() callRichard Levitte2020-11-111-21/+21
* Unify ssl3_get_cipher_by_std_name() implementationBenjamin Kaduk2020-10-291-13/+5
* [ssl] Support ssl_encapsulate on server sideNicola Tuveri2020-10-141-1/+64
* [ssl] Support ssl_decapsulate on client sideNicola Tuveri2020-10-141-16/+83
* optimise ssl3_get_cipher_by_std_name()hklaas2020-09-271-2/+1
* Fix safestack issues in x509.hMatt Caswell2020-09-131-3/+0
* Fix safestack issues in ssl.hMatt Caswell2020-09-131-1/+0
* Add X509 related libctx changes.Shane Lontis2020-07-241-4/+0