summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
...
* Fix .Xr order. From mandoc -Tlint.tb2021-06-262-7/+7
* Garbage collect prototoype for ssl_parse_serverhello_tlsext() whichtb2021-06-231-3/+1
* zap wonky commas;jmc2021-06-221-5/+5
* Clarify tls_config_set_*_file() file I/O semanticskn2021-06-221-13/+11
* Add GnuTLS interoperability test in appstest.shinoguchi2021-06-211-1/+109
* zap trailing whitespacetb2021-06-191-4/+7
* Correctly handle epoch wrapping in dtls1_get_bitmap().jsing2021-06-192-4/+5
* Add DTLS test cases that use non-zero initial epochs.jsing2021-06-192-5/+44
* Provide the ability to set the initial DTLS epoch value.jsing2021-06-194-7/+29
* Initialise the epoch for the DTLS processed and unprocessed queues.jsing2021-06-191-1/+4
* Add more complex DTLS tests for delay/reordering.jsing2021-06-191-17/+160
* Expand comment that details why two DTLS tests currently fail.jsing2021-06-191-2/+5
* Provide the ability to delay/reorder DTLS packets.jsing2021-06-191-14/+147
* Remove SSL_CTX_set_read_ahead() calls - it is now the default for DTLS.jsing2021-06-181-3/+1
* Like ARM, RISC-V does not implement floating point exceptions.kettenis2021-06-173-6/+6
* Mop up part of dtls1_dispatch_alert().jsing2021-06-151-9/+2
* Simplify nonce handling in the TLSv1.2 record layer.jsing2021-06-141-13/+16
* Remove TLS1_AD_INTERNAL_ERROR from internal visibility againtb2021-06-141-3/+1
* Use SSL_AD_INTERNAL_ERRORtb2021-06-141-2/+2
* ugly hack around broken build until people wake up.deraadt2021-06-141-1/+3
* Add SSL_AD_MISSING_EXTENSION.jsing2021-06-132-2/+9
* Define SSL_AD_* as actual values.jsing2021-06-133-42/+49
* Remove tls1_alert_code().jsing2021-06-133-73/+3
* Place obsolete alerts under #ifndef LIBRESSL_INTERNAL.jsing2021-06-131-4/+7
* Remove references to obsolete alerts.jsing2021-06-132-26/+2
* space between macro args and punctuation;jmc2021-06-122-13/+13
* RFC 4507bis can refer to various RFCs but this instance is abouttb2021-06-121-4/+5
* space between RFC and number;jmc2021-06-117-29/+29
* Only use SSL_AD_* internally.jsing2021-06-113-88/+88
* add AES-GCM constants from RFC 7714 for SRTPlandry2021-06-113-4/+20
* sync cert.pem with Mozilla's CA list generated from certdata.txtsthen2021-06-111-476/+163
* SSL3_AD_ILLEGAL_PARAMETER is not a valid SSLerror() reason code.jsing2021-06-111-2/+2
* Indent all labels with a single space.jsing2021-06-1111-44/+44
* Enable libexecinfo regress.mortimer2021-06-091-1/+4
* Simplify tlsext_ecpf_parse()tb2021-06-081-8/+4
* Rewrap a comment to avoid an overlong linetb2021-06-081-3/+3
* Ignore the record version for early alertstb2021-06-081-4/+10
* TLSv1.3 server: avoid sending alerts in legacy recordstb2021-06-081-3/+4
* Adjust alert for ECPF without uncompressed point formattb2021-06-081-3/+4
* Fix pkg-config .pc files with LibreSSLinoguchi2021-06-082-9/+7
* Update RFC reference. RFC 4366 was obsoleted by RFC 6066.tb2021-06-011-2/+2
* Avoid sending a trailing dot in SNI as a clienttb2021-06-011-6/+19
* Remove unnecessary cast in free.tb2021-06-011-2/+2
* Since our unix receive queue got longer, the test run-t_sendrecvbluhm2021-05-311-24/+30
* EVP_Digest*: fix documented return values.tb2021-05-202-10/+6
* Adjust libcrypto obj_xref.txt to obj_xref.hinoguchi2021-05-191-2/+2
* Absorb SSL_AEAD_CTX into struct tls12_record_protection.jsing2021-05-163-73/+63
* Zero the tls12_record_protection struct instead of individual fields.jsing2021-05-161-9/+3
* Avoid including tls13_internal.h in tls13_record.h.jsing2021-05-161-2/+1
* Avoid pulling ssl_locl.h into self-contained code.jsing2021-05-164-8/+4