summaryrefslogtreecommitdiffstats
path: root/ssl/s3_srvr.c
Commit message (Expand)AuthorAgeFilesLines
* Clean premaster_secret for GOSTMatt Caswell2015-06-041-0/+1
* Clean Kerberos pre-master secretMatt Caswell2015-06-041-5/+16
* Check for ClientHello message overrunsMatt Caswell2015-04-141-1/+41
* Re-align some comments after running the reformat script.OpenSSL_1_0_0-post-reformatMatt Caswell2015-01-221-30/+30
* Rerun util/openssl-format-source -v -c .OpenSSL_1_0_0-post-auto-reformatMatt Caswell2015-01-221-2/+1
* Run util/openssl-format-source -v -c .Matt Caswell2015-01-221-2939/+2813
* Tweaks for comments due to indent's inability to handle themMatt Caswell2015-01-221-1/+2
* Fix source where indent will not be able to copeMatt Caswell2015-01-221-2/+3
* mark all block comments that need format preserving so thatTim Hudson2015-01-221-8/+11
* Unauthenticated DH client certificate fix.Dr. Stephen Henson2015-01-081-1/+1
* Only allow ephemeral RSA keys in export ciphersuites.Dr. Stephen Henson2015-01-061-15/+6
* Premaster secret handling fixesAdam Langley2014-12-171-8/+28
* Check return value of ssl3_output_cert_chainMatt Caswell2014-12-151-0/+5
* Fixed memory leak in the event of a failure of BUF_MEM_growMatt Caswell2014-12-081-0/+1
* RT3067: simplify patchEmilia Kasper2014-09-241-52/+20
* This change alters the processing of invalid, RSA pre-master secrets soAdam Langley2014-09-241-45/+89
* Don't limit message sizes in ssl3_get_cert_verify.Dr. Stephen Henson2014-07-051-1/+1
* Fix for CVE-2014-0224Dr. Stephen Henson2014-06-031-0/+2
* Allocate extra space when NETSCAPE_HANG_BUG defined.David Ramos2014-06-011-0/+5
* Replace manual ASN1 decoder with ASN1_get_objectSerguei E. Leontiev2014-05-121-16/+7
* ssl/s3_[clnt|srvr].c: fix warnings and linking error.Andy Polyakov2013-02-091-0/+5
* Backport OCSP Stapling fix.Ben Laurie2012-10-041-1/+11
* s3_srvr.c: fix typo [from HEAD].Andy Polyakov2012-04-151-1/+1
* Fix bug in CVE-2011-4619: check we have really received a client helloDr. Stephen Henson2012-02-161-8/+7
* Only allow one SGC handshake restart for SSL/TLS. (CVE-2011-4619)Dr. Stephen Henson2012-01-041-0/+10
* Submitted by: Adam Langley <agl@chromium.org>Dr. Stephen Henson2012-01-041-0/+1
* (EC)DH memory handling fixes.Bodo Möller2011-09-051-7/+15
* set encodedPoint to NULL after freeing itDr. Stephen Henson2011-05-191-0/+1
* fix for CVE-2010-4180Dr. Stephen Henson2010-12-021-0/+5
* Get correct GOST private key instead of just assuming the last one isDr. Stephen Henson2010-11-141-3/+10
* Add Kerberos fix which was in 0.9.8-stable but never committed to HEAD andDr. Stephen Henson2010-02-271-3/+2
* PR: 1949Dr. Stephen Henson2010-01-261-20/+14
* oopsDr. Stephen Henson2010-01-261-2/+0
* export OPENSSL_isservice and make updateDr. Stephen Henson2010-01-261-0/+2
* The fix for PR#1949 unfortunately broke cases where the BIO_CTRL_WPENDINGDr. Stephen Henson2010-01-241-1/+15
* If legacy renegotiation is not permitted then send a fatal alert if a patchedDr. Stephen Henson2010-01-221-0/+12
* Client side compression algorithm sanity checks: ensure old compressionDr. Stephen Henson2010-01-011-1/+1
* Compression handling on session resume was badly broken: it alwaysDr. Stephen Henson2010-01-011-1/+54
* Add support for magic cipher suite value (MCSV). Make secure renegotiationDr. Stephen Henson2009-12-081-1/+1
* PR: 2121Dr. Stephen Henson2009-12-081-12/+1
* PR: 2115Dr. Stephen Henson2009-12-011-1/+12
* Fix statless session resumption so it can coexist with SNIDr. Stephen Henson2009-10-301-5/+6
* Typo presumably...Dr. Stephen Henson2009-09-061-1/+1
* PR: 2028Dr. Stephen Henson2009-09-041-15/+20
* Update from 0.9.8-stable.Dr. Stephen Henson2009-06-261-1/+1
* Update from HEAD.Dr. Stephen Henson2009-06-241-1/+1
* Updates from HEAD.Dr. Stephen Henson2009-06-161-12/+52
* Update from HEAD.Dr. Stephen Henson2009-06-131-0/+2
* Fix WIN32 warnings.Dr. Stephen Henson2009-04-221-2/+2
* Some fixes for kerberos builds.Dr. Stephen Henson2009-04-211-1/+1