index
:
openbsd
OPENBSD_2_0
OPENBSD_2_1
OPENBSD_2_2
OPENBSD_2_3
OPENBSD_2_4
OPENBSD_2_5
OPENBSD_2_6
OPENBSD_2_7
OPENBSD_2_8
OPENBSD_2_9
OPENBSD_3_0
OPENBSD_3_1
OPENBSD_3_2
OPENBSD_3_3
OPENBSD_3_4
OPENBSD_3_5
OPENBSD_3_6
OPENBSD_3_7
OPENBSD_3_8
OPENBSD_3_9
OPENBSD_4_0
OPENBSD_4_1
OPENBSD_4_2
OPENBSD_4_3
OPENBSD_4_4
OPENBSD_4_5
OPENBSD_4_6
OPENBSD_4_7
OPENBSD_4_8
OPENBSD_4_9
OPENBSD_5_0
OPENBSD_5_1
OPENBSD_5_2
OPENBSD_5_3
OPENBSD_5_4
OPENBSD_5_5
OPENBSD_5_6
OPENBSD_5_7
OPENBSD_5_8
OPENBSD_5_9
OPENBSD_6_0
OPENBSD_6_1
OPENBSD_6_2
OPENBSD_6_3
OPENBSD_6_4
OPENBSD_6_5
OPENBSD_6_6
OPENBSD_6_7
OPENBSD_6_8
OPENBSD_6_9
OPENBSD_7_0
OPENBSD_7_1
OPENBSD_7_2
OPENBSD_7_3
OPENBSD_7_4
OPENBSD_7_5
OPENBSD_7_6
master
A mirror of https://github.com/libressl/openbsd.git
summary
refs
log
tree
commit
diff
log msg
author
committer
range
Commit message (
Expand
)
Author
Age
Files
Lines
...
*
instead of calling abort() for 3 "must not use anymore" interfaces,
deraadt
2019-01-29
1
-7
/
+4
*
Remove SSLv23 padding mode from rsautl's usage (left behind in a removal
tb
2019-01-29
1
-2
/
+1
*
spelling;
jmc
2019-01-28
1
-3
/
+3
*
Deduplicate a bunch of replicated code in the extension handling
beck
2019-01-28
1
-86
/
+50
*
Add tls_extension_seen(), a utility to know if a particular extension
beck
2019-01-28
2
-9
/
+15
*
zap a commented out line. 0RTT will need more thought than
tb
2019-01-27
1
-2
/
+1
*
refactor and clean up the code generating dot output.
tb
2019-01-27
1
-53
/
+76
*
Recent discussions about abort() potentially leaving key material in
deraadt
2019-01-26
1
-5
/
+8
*
print errors to stderr
tb
2019-01-25
1
-19
/
+21
*
sort output suffixes
tb
2019-01-25
1
-2
/
+2
*
I am retiring my old email address; replace it with my OpenBSD one.
millert
2019-01-25
27
-61
/
+61
*
Add code to visualize the state machine. Both the state machine and the
tb
2019-01-24
2
-5
/
+79
*
Set pointer variables in tls13 handshake to NULL on clear
beck
2019-01-24
1
-1
/
+5
*
set the NEGOTIATED flag in the flags argument rather than
tb
2019-01-24
1
-4
/
+4
*
Add server side of versions, keyshare, and client and server of cookie
beck
2019-01-24
5
-28
/
+742
*
move the extensions_seen into the handshake struct
beck
2019-01-24
3
-6
/
+12
*
Remove SHA224 based sigalgs from use in TLS 1.2 as SHA224 is deprecated.
beck
2019-01-24
3
-37
/
+22
*
Correct ECDSA_SECP512R1 typo to ECDSA_SECP521R1
beck
2019-01-23
2
-6
/
+6
*
make whitespace inside curlies consistent; sort function prototypes.
tb
2019-01-23
1
-24
/
+24
*
Rename NUM_HANDSHAKE to handshake_count and make it a variable
tb
2019-01-23
3
-13
/
+47
*
assert.h is often misused. It should not be used in a library
beck
2019-01-23
2
-8
/
+5
*
Modify sigalgs extension processing to accomodate TLS 1.3.
beck
2019-01-23
8
-40
/
+93
*
revert previous, accidentally contained another diff in addition
beck
2019-01-23
10
-408
/
+61
*
Modify sigalgs extension processing for TLS 1.3.
beck
2019-01-23
10
-61
/
+408
*
Sync the handshakes table with the generated table in regress.
tb
2019-01-23
1
-19
/
+19
*
incorrrect spelling
tb
2019-01-23
1
-2
/
+2
*
do not print the command in the print: target
tb
2019-01-23
1
-2
/
+2
*
Add a regression test that builds up the handshake state table
tb
2019-01-23
2
-1
/
+399
*
Remove static from handshakes[][] so it is visible from regress/
tb
2019-01-23
1
-2
/
+2
*
No need to include <bsd.prog.mk> here.
tb
2019-01-23
2
-4
/
+2
*
sort sections, and add a missing verb to the EXAMPLES text;
jmc
2019-01-22
1
-24
/
+24
*
Wrap long line
otto
2019-01-22
1
-4
/
+4
*
bump minors after symbol addition
tb
2019-01-22
3
-3
/
+3
*
Document SSL_get1_supported_ciphers(3) and SSL_get_client_ciphers(3).
tb
2019-01-22
1
-7
/
+61
*
Add a re-implementation of SSL_get1_supported_ciphers().
tb
2019-01-22
3
-2
/
+38
*
Provide SSL_get_client_ciphers().
tb
2019-01-22
3
-2
/
+12
*
Add missing symbols from the EC_KEY_METHOD port.
tb
2019-01-22
1
-0
/
+8
*
add support for xchacha20 and xchacha20-poly1305
dlg
2019-01-22
10
-11
/
+399
*
lenght -> length
jsg
2019-01-21
2
-3
/
+3
*
a few tweaks
tedu
2019-01-21
1
-5
/
+9
*
Add example showing a proper comparison function, as many examples show
otto
2019-01-21
1
-3
/
+40
*
Use the actual handshake message type in the certificate request handler.
jsing
2019-01-21
1
-4
/
+2
*
Move ssl_cipher_list_to_bytes() and ssl_bytes_to_cipher_list() to
tb
2019-01-21
2
-116
/
+120
*
Provide the initial TLSv1.3 client implementation.
jsing
2019-01-21
5
-25
/
+192
*
Wire up the handshake message send and recv actions.
jsing
2019-01-21
2
-4
/
+44
*
In ssl_lib.c rev. 1.197, jsing@ added TLSv1.3 support to SSL_get_version(3).
schwarze
2019-01-21
1
-2
/
+4
*
The main handshake loop can be shared between client and server.
jsing
2019-01-21
2
-29
/
+15
*
Use ssl_cipher_is_permitted() in ssl_cipher_list_to_bytes().
tb
2019-01-21
1
-9
/
+6
*
Add ssl_cipher_is_permitted(), an internal helper function that
tb
2019-01-21
3
-2
/
+49
*
Correct some rwstate handling that I broke when refactoring.
jsing
2019-01-21
1
-3
/
+13
[prev]
[next]