summaryrefslogtreecommitdiffstats
path: root/ssl
AgeCommit message (Expand)Author
2014-12-04ssl_create_cipher_list: check whether push onto cipherstack succeedsJonas Maebe
2014-12-04ssl_cert_dup: Fix memory leakJonas Maebe
2014-12-04dtls1_new: free s on error pathKurt Roeckx
2014-12-04dtls1_heartbeat: check for NULL after allocating s->cert->ctypesJonas Maebe
2014-12-04dtls1_process_heartbeat: check for NULL after allocating bufferJonas Maebe
2014-12-04Remove incorrect code inadvertently introduced through commit 59669b6ab.Matt Caswell
2014-12-04Remove SSLv2 supportKurt Roeckx
2014-12-03Remove "#if 0" codeMatt Caswell
2014-12-03Only use the fallback mtu after 2 unsuccessful retransmissions if it is lessMatt Caswell
2014-12-03If we really get a situation where the underlying mtu is less than the minimumMatt Caswell
2014-12-03Fix dtls_query_mtu so that it will always either complete with an mtu that isMatt Caswell
2014-12-03Remove instances in libssl of the constant 28 (for size of IPv4 header + UDP)Matt Caswell
2014-12-03The first call to query the mtu in dtls1_do_write correctly checks that theMatt Caswell
2014-12-03The SSL_OP_NO_QUERY_MTU option is supposed to stop the mtu from beingMatt Caswell
2014-12-03Verify that we have a sensible message len and fail if notMatt Caswell
2014-11-28Remove all .cvsignore filesRich Salz
2014-11-28[PR3597] Advance to the next state variant when reusing messages.Richard Levitte
2014-11-27Fix warning in ssl2_encMatt Caswell
2014-11-27Remove more references to dtls1_encMatt Caswell
2014-11-27Check EVP_Cipher return values for SSL2Matt Caswell
2014-11-27Delete unused fileMatt Caswell
2014-11-27Add checks to the return value of EVP_Cipher to prevent silent encryption fai...Matt Caswell
2014-11-27Remove redundant checks in ssl_cert_dup. This was causing spurious error mess...Matt Caswell
2014-11-27Add include of ssl.h which is required by srtp.hMatt Caswell
2014-11-26Fixed memory leak due to incorrect freeing of DTLS reassembly bit maskMatt Caswell
2014-11-25Corrected comments in ssl.h about SSLv23_method and friendsMatt Caswell
2014-11-20Fix SuiteB chain checking logic.Dr. Stephen Henson
2014-11-20Do not resume a session if the negotiated protocol version does not matchDavid Benjamin
2014-11-20Ensure SSL3_FLAGS_CCS_OK (or d1->change_cipher_spec_ok for DTLS) is resetEmilia Kasper
2014-11-20Always require an advertised NewSessionTicket message.Emilia Kasper
2014-11-20Remove ssl3_check_finished.Emilia Kasper
2014-11-20Set s->hit when resuming from external pre-shared secret.Emilia Kasper
2014-11-20Reset s->tlsext_ticket_expected in ssl_scan_serverhello_tlsext.Emilia Kasper
2014-11-19New option no-ssl3-method which removes SSLv3_*methodDr. Stephen Henson
2014-11-19Only handle RI extension for SSLv3Dr. Stephen Henson
2014-11-19Process signature algorithms before deciding on certificate.Dr. Stephen Henson
2014-11-18Added references to RFC 7027Matt Caswell
2014-11-18Prevent use of binary curves when OPENSSL_NO_EC2M is definedDr. Stephen Henson
2014-11-18Updated comment references to draft-ietf-tls-ecc-12 to refer to RFC4492 insteadMatt Caswell
2014-11-13Additional output for ssltest.Dr. Stephen Henson
2014-11-13Add SSL_CONF support to ssltest.Dr. Stephen Henson
2014-10-28Tighten session ticket handlingEmilia Kasper
2014-10-27Fix ssltest logic when some protocols are compiled out.Emilia Kasper
2014-10-24Copy negotiated parameters in SSL_set_SSL_CTX.Dr. Stephen Henson
2014-10-24Process signature algorithms in ClientHello late.Dr. Stephen Henson
2014-10-21Fix and improve SSL_MODE_SEND_FALLBACK_SCSV documentation.Bodo Moeller
2014-10-21When processing ClientHello.cipher_suites, don't ignore cipher suitesBodo Moeller
2014-10-21Keep old method in case of an unsupported protocolKurt Roeckx
2014-10-15Fix no-ssl3 configuration optionGeoff Thorpe
2014-10-15Fix for session tickets memory leak.Dr. Stephen Henson