summaryrefslogtreecommitdiffstats
path: root/ssl (follow)
Commit message (Expand)AuthorAgeFilesLines
* Fix typosJakub Wilk2019-04-101-1/+1
* ssl: Linux TLS Rx OffloadBoris Pismenny2019-04-013-20/+124
* Remove heartbeats completelyRichard Levitte2019-03-294-19/+3
* conn_is_closed should return 1 if get_last_sys_error is WSAECONNRESETPaul Monson2019-03-281-0/+4
* constify *_dup() and *i2d_*() and related functions as far as possible, intro...David von Oheimb2019-03-063-8/+8
* Adapt OPENSSL_INIT_DEBUG to the new generic trace APIRichard Levitte2019-03-061-24/+9
* Adapt CIPHER_DEBUG to the new generic trace APIRichard Levitte2019-03-064-48/+57
* Adapt SSL_DEBUG to the new generic trace APIRichard Levitte2019-03-064-123/+73
* Don't write the tick_identity to the sessionMatt Caswell2019-03-055-25/+33
* Don't restrict the number of KeyUpdate messages we can processMatt Caswell2019-02-223-12/+0
* Don't interleave handshake and other record types in TLSv1.3Matt Caswell2019-02-192-1/+11
* Add option to disable Extended Master SecretTodd Short2019-02-154-3/+11
* Don't signal SSL_CB_HANDSHAKE_START for TLSv1.3 post-handshake messagesMatt Caswell2019-02-143-24/+12
* Ignore cipher suites when setting cipher listSam Roberts2019-02-141-2/+22
* Make some simple getters take const SSL/SSL_CTXSam Roberts2019-02-051-10/+10
* Fix end-point shared secret for DTLS/SCTPMichael Tuexen2019-02-012-4/+28
* add an additional async notification communication method based on callbackPing Yu2019-01-272-0/+56
* Revert "Keep the DTLS timer running after the end of the handshake if appropr...Matt Caswell2019-01-242-31/+0
* Don't get the mac type in TLSv1.3Matt Caswell2019-01-151-3/+1
* Add missing entries in ssl_mac_pkey_idMatt Caswell2019-01-151-0/+2
* Don't artificially limit the size of the ClientHelloMatt Caswell2019-01-081-7/+0
* More configurable crypto and ssl library initializationViktor Dukhovni2019-01-071-6/+7
* Don't complain if we receive the cryptopro extension in the ClientHelloMatt Caswell2019-01-071-2/+4
* Restore compatibility with GOST2001 implementations.Dmitry Belyavskiy2019-01-061-1/+6
* Fix a RUN_ONCE bugMatt Caswell2019-01-041-2/+4
* Eliminate unused buffers from ssl3_change_cipher_stateDmitry Belyavskiy2019-01-031-6/+0
* Remove unused variables from tls1_change_cipher_stateDmitry Belyavskiy2019-01-031-12/+0
* Fix a minor nit in the hkdflabel sizeBernd Edlinger2018-12-301-1/+1
* Use (D)TLS_MAX_VERSION_INTERNAL internallyKurt Roeckx2018-12-155-8/+11
* ssl: Linux TLS Tx OffloadBoris Pismenny2018-12-076-49/+200
* Following the license change, modify the boilerplates in ssl/Richard Levitte2018-12-0651-51/+51
* Refactor the computation of API version limitsRichard Levitte2018-12-062-2/+2
* Fix some SSL_export_keying_material() issuesMatt Caswell2018-12-055-28/+53
* Revert "Reduce stack usage in tls13_hkdf_expand"Matt Caswell2018-12-051-12/+4
* Fix usage of deprecated SSL_set_tmp_ecdh()Antoine Salon2018-12-011-7/+3
* Fix access zero memory if SSL_DEBUG is enabledPaul Yang2018-11-272-3/+6
* Update copyright yearMatt Caswell2018-11-203-3/+3
* Add a missing SSLfatal callMatt Caswell2018-11-152-3/+10
* Add SSL_CTX_set_tmp_ecdh.podAntoine Salon2018-11-151-4/+4
* Fix no-ec and no-tls1_2Matt Caswell2018-11-143-1/+12
* Added missing signature algorithm reflection functionsViktor Dukhovni2018-11-122-2/+30
* Separate ca_names handling for client and serverMatt Caswell2018-11-127-27/+76
* Don't negotiate TLSv1.3 if our EC cert isn't TLSv1.3 capableMatt Caswell2018-11-123-2/+48
* Unbreak SECLEVEL 3 regression causing it to not accept any ciphers.Tomas Mraz2018-11-101-2/+2
* Add EVP_PKEY_supports_digest_nid()David Woodhouse2018-11-101-25/+30
* Honour mandatory digest on private key in has_usable_cert()David Woodhouse2018-11-101-3/+18
* Give a better error if an attempt is made to set a zero length groups listMatt Caswell2018-11-081-0/+4
* Ignore disabled ciphers when deciding if we are using ECCMatt Caswell2018-11-081-5/+8
* Fix return formatting.Pauli2018-11-051-1/+2
* Cleanse the key log buffer.Pauli2018-11-051-2/+2