summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
...
* Remove lots of outdated information found by jsing@.schwarze2017-08-121-192/+14
* Document tls_config_set_dheparams().jsing2017-08-121-4/+13
* Document tls_reset().jsing2017-08-121-2/+13
* Update the TLSv1.2 Client Hello messages, due to the removal of DSAjsing2017-08-121-20/+18
* Remove support for DSS/DSA, since we removed the cipher suites a whilejsing2017-08-129-85/+16
* Clear the child pointer in CBB_cleanup(), so that we have fewer pointersjsing2017-08-121-1/+2
* remove bogus ".POD" from .Dt name; noticed by jsing@schwarze2017-08-111-3/+3
* Be consistent with goto labels, failure flag and use of FAIL macro.jsing2017-08-111-128/+105
* doug@ added code in here as well.jsing2017-08-111-1/+2
* Sort by extension/function name.jsing2017-08-111-577/+576
* I don't think eay will ever fix this...jsing2017-08-111-2/+2
* style(9) in ssl_set_cert_masks().jsing2017-08-111-7/+7
* Rewrite EllipticCurves TLS extension handling using CBB/CBS and the newdoug2017-08-115-77/+472
* Convert ssl3_send_certificate_request() to CBB.jsing2017-08-113-63/+73
* new sentence, new line;jmc2017-08-111-3/+4
* Add doug@'s copyright since he just added code to these two files.jsing2017-08-112-2/+4
* Bump minor due to symbol addition.jsing2017-08-111-1/+1
* Rewrite the ECPointFormats TLS extension handling using CBB/CBS and thedoug2017-08-115-148/+595
* Add a tls_config_set_ecdhecurves() function to libtls, which allows thejsing2017-08-107-34/+108
* Clean up the EC key/curve configuration handling.jsing2017-08-107-120/+54
* first draft of tests for newlocale(3), duplocale(3), uselocale(3)schwarze2017-08-102-0/+268
* Pull out the code that identifies if we have an ECC cipher in the cipherjsing2017-08-093-34/+52
* Don't use tls_cert_hash for the hashing used by the engine offloading magicclaudio2017-08-093-11/+24
* Consistently return from each SSL/SSL_CTX control case, rather thanjsing2017-08-091-33/+27
* Split out the remaining SSL_CTX controls into individual functions.jsing2017-08-091-40/+88
* Start splitting out SSL_CTX controls into individual functions, so thatjsing2017-08-091-71/+92
* Be consistent and return from each SSL control case, rather than breakingjsing2017-08-091-18/+10
* Split out the remaining SSL controls into individual functions.jsing2017-08-091-46/+93
* Split more controls into individual functions.jsing2017-08-091-64/+91
* Start splitting out controls into individual functions, so that they canjsing2017-08-091-29/+63
* Remove unnecessary curly braces and unindent. Also add a few blank linesjsing2017-08-091-11/+13
* Fix conditionals for DH controls.jsing2017-08-091-3/+3
* add missing and correct misspelled names, most in NAME sections;schwarze2017-08-0110-33/+45
* correct function name;jmc2017-08-011-3/+3
* Sort subdir, run getaddrinfo test, remove vax case.bluhm2017-07-271-13/+21
* Sort expected getaddrinfo output in inet4 inet6 order, then thebluhm2017-07-272-46/+37
* Fix all clang warnings in libc regress and cleanup some make files.bluhm2017-07-2718-75/+67
* Mark the invalid memory location as volatile, otherwise clang wouldbluhm2017-07-271-2/+2
* as noted by Hanno Boeck, using the *check_private_key functions isbenno2017-07-251-6/+22
* Extend the SNI tests to ensure that we have a hostname in the sessionjsing2017-07-241-2/+31
* Rewrite and move the last remnants of the ServerHello SNI handling intojsing2017-07-242-29/+25
* Add regress coverage for the TLS Renegotiation Indication extension.jsing2017-07-241-1/+266
* Rewrite the TLS Renegotiation Indication extension handling using CBB/CBSjsing2017-07-246-346/+161
* Hook the TLS extension parsing framework into the serverhello parsing.jsing2017-07-231-1/+6
* zap trailing whitespace;jmc2017-07-221-2/+2
* rework the page a bit, clarify a few things, maybe better wordingtedu2017-07-221-8/+13
* Allow leading . in nameConstraints. from openssl via jabberwock. ok jsingtedu2017-07-201-2/+2
* Check the return value of CBB_init_fixed(), since it can fail.jsing2017-07-191-3/+5
* Provide a new regress test for TLS extension handlers, currently coveringjsing2017-07-163-1/+256
* Start rewriting TLS extension handling.jsing2017-07-164-141/+328