summaryrefslogtreecommitdiffstats
path: root/ssl
AgeCommit message (Expand)Author
2015-01-08A memory leak can occur in dtls1_buffer_record if either of the calls toMatt Caswell
2015-01-08Unauthenticated DH client certificate fix.Dr. Stephen Henson
2015-01-08Follow on from CVE-2014-3571. This fixes the code that was the original sourceMatt Caswell
2015-01-08Fix crash in dtls1_get_record whilst in the listen state where you get twoDr. Stephen Henson
2015-01-07fix error discrepancyDr. Stephen Henson
2015-01-06Only inherit the session ID context in SSL_set_SSL_CTX if the existingEmilia Kasper
2015-01-06Only allow ephemeral RSA keys in export ciphersuites.Dr. Stephen Henson
2015-01-05ECDH downgrade bug fix.Dr. Stephen Henson
2015-01-05Ensure that the session ID context of an SSL* is updatedAdam Langley
2015-01-02Clear existing extension state.Dr. Stephen Henson
2014-12-17Clear warnings/errors within TLS_DEBUG code sectionsRichard Levitte
2014-12-17Clear warnings/errors within KSSL_DEBUG code sectionsRichard Levitte
2014-12-17Clear warnings/errors within CIPHER_DEBUG code sectionsRichard Levitte
2014-12-17Clear warnings/errors within CIPHER_DEBUG code sectionsRichard Levitte
2014-12-17Premaster secret handling fixesAdam Langley
2014-12-16Add OPENSSL_NO_ECDH guardsMatt Caswell
2014-12-16Remove extraneous white space, and add some bracesMatt Caswell
2014-12-16DTLS fixes for signed/unsigned issuesMatt Caswell
2014-12-15Checkout return value of dtls1_output_cert_chainMatt Caswell
2014-12-15Check return value of ssl3_output_cert_chainMatt Caswell
2014-12-13Fix memory leak in s2_srvr.c if BUF_MEM_grow failsMatt Caswell
2014-12-13Fixed memory leak if BUF_MEM_grow failsMatt Caswell
2014-12-08Fixed memory leak in the event of a failure of BUF_MEM_growMatt Caswell
2014-12-08Fix memory leak in SSL_new if errors occur.Matt Caswell
2014-12-05Reject elliptic curve lists of odd lengths.Emilia Kasper
2014-12-04Remove incorrect code inadvertently introduced through commit 59669b6ab.Matt Caswell
2014-12-03Remove "#if 0" codeMatt Caswell
2014-12-03Only use the fallback mtu after 2 unsuccessful retransmissions if it is lessMatt Caswell
2014-12-03If we really get a situation where the underlying mtu is less than the minimumMatt Caswell
2014-12-03Fix dtls_query_mtu so that it will always either complete with an mtu that isMatt Caswell
2014-12-03Remove instances in libssl of the constant 28 (for size of IPv4 header + UDP)Matt Caswell
2014-12-03The first call to query the mtu in dtls1_do_write correctly checks that theMatt Caswell
2014-12-03The SSL_OP_NO_QUERY_MTU option is supposed to stop the mtu from beingMatt Caswell
2014-12-03Verify that we have a sensible message len and fail if notMatt Caswell
2014-11-28[PR3597] Advance to the next state variant when reusing messages.Richard Levitte
2014-11-27Fixed warning in ssl2_encMatt Caswell
2014-11-27Check EVP_Cipher return values for SSL2Matt Caswell
2014-11-27Add checks to the return value of EVP_Cipher to prevent silent encryption fai...Matt Caswell
2014-11-27Remove redundant checks in ssl_cert_dup. This was causing spurious error mess...Matt Caswell
2014-11-27Add include of ssl.h which is required by srtp.hMatt Caswell
2014-11-26Fixed memory leak due to incorrect freeing of DTLS reassembly bit maskMatt Caswell
2014-11-25Corrected comments in ssl.h about SSLv23_method and friendsMatt Caswell
2014-11-20Do not resume a session if the negotiated protocol version does not matchDavid Benjamin
2014-11-20Ensure SSL3_FLAGS_CCS_OK (or d1->change_cipher_spec_ok for DTLS) is resetEmilia Kasper
2014-11-20Always require an advertised NewSessionTicket message.Emilia Kasper
2014-11-20Remove ssl3_check_finished.Emilia Kasper
2014-11-20Set s->hit when resuming from external pre-shared secret.Emilia Kasper
2014-11-20Reset s->tlsext_ticket_expected in ssl_scan_serverhello_tlsext.Emilia Kasper
2014-11-19New option no-ssl3-method which removes SSLv3_*methodDr. Stephen Henson
2014-11-18Added OPENSSL_NO_EC2M guards around the preferred EC curve listMatt Caswell