summaryrefslogtreecommitdiff
path: root/ssl
Commit message (Expand)AuthorAgeFilesLines
* Make tesfipsssl pass.FIPS_098_TEST_4appro2007-08-211-1/+1
* Make FIPS cipher alias work again.steve2007-08-131-1/+2
* Jumbo framework update.appro2007-08-011-1/+1
* Avoid warnings. Fix fips_dssvs program.steve2007-06-221-858/+698
* Disable DES in FIPS mode.steve2007-05-211-16/+16
* Merge from 0.9.8-stable.steve2007-04-251-5/+1
* Merge from 0.9.8 stable branch.steve2007-04-246-124/+126
* Don't process any of kssl.c if krb5 option not set.steve2007-04-031-7/+9
* And so it begins...steve2007-03-2213-2040/+724
* Fix for builds without DTLS support.bodo2012-01-051-0/+2
* Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de>, Michael Tuexen <t...steve2012-01-041-10/+16
* Clear bytes used for block padding of SSL 3.0 records. (CVE-2011-4576)steve2012-01-041-0/+3
* Only allow one SGC handshake restart for SSL/TLS. (CVE-2011-4619)steve2012-01-044-1/+26
* Submitted by: Adam Langley <agl@chromium.org>steve2012-01-042-0/+7
* PR: 2326steve2011-12-261-3/+3
* Resolve a stack set-up race condition (if the list of compressionbodo2011-12-021-0/+1
* PR: 2628steve2011-10-271-2/+13
* Oops: this change (http://cvs.openssl.org/chngview?cn=21503)bodo2011-10-191-3/+0
* In ssl3_clear, preserve s3->init_extra along with s3->rbuf.bodo2011-10-131-1/+3
* fix signed/unsigned warningsteve2011-09-261-1/+1
* PR: 2602steve2011-09-234-6/+15
* (EC)DH memory handling fixes.bodo2011-09-052-7/+21
* PR: 2573steve2011-09-011-9/+11
* PR: 2555steve2011-07-201-0/+8
* PR: 2550steve2011-07-201-1/+0
* PR: 2543steve2011-06-221-1/+1
* PR: 2529steve2011-05-251-56/+73
* Oops use up to date patch for PR#2506steve2011-05-252-2/+16
* PR: 2506steve2011-05-251-9/+63
* PR: 2505steve2011-05-251-2/+4
* set encodedPoint to NULL after freeing itsteve2011-05-191-0/+1
* PR: 2462steve2011-04-032-14/+2
* PR: 2458steve2011-04-032-7/+16
* PR: 2457steve2011-04-031-1/+1
* OCSP stapling fix (OpenSSL 0.9.8r/1.0.0d)OpenSSL_0_9_8rbodo2011-02-081-1/+7
* Assorted bugfixes:bodo2011-02-031-2/+3
* Since DTLS 1.0 is based on TLS 1.1 we should never return a decryption_failedsteve2011-01-042-6/+3
* fix for CVE-2010-4180steve2010-12-022-0/+8
* fix CVE-2010-3864steve2010-11-161-4/+14
* PR: 2314steve2010-10-101-0/+1
* Fix gcc 4.6 warnings. Check TLS server hello extension length.ben2010-06-1213-54/+25
* PR: 2230steve2010-05-031-13/+14
* PR: 2230steve2010-04-141-9/+9
* fix signed/unsigned comparison warningssteve2010-04-141-3/+3
* PR: 2230steve2010-04-142-84/+234
* PR: 2229steve2010-04-141-16/+11
* PR: 2228steve2010-04-141-0/+3
* Third argument to dtls1_buffer_record is by referencelevitte2010-04-131-2/+2
* Add SHA2 algorithms to SSL_library_init(). Although these aren't usedsteve2010-04-071-0/+8
* PR: 2218steve2010-04-061-9/+10