summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
* In DTLS, use_srtp is part of the extended server hello while in TLSv1.3,libressl-v2.9.2tb2019-05-151-2/+3
* LibreSSL 2.9.2bcook2019-05-131-3/+3
* This commit was manufactured by cvs2git to create branch 'OPENBSD_6_5'.libressl-v2.9.1cvs2svn2019-04-100-0/+0
* Avoid an overread caused by d2i_PrivateKey().jsing2019-04-101-1/+3
* Recommend SSL_CTX_add1_chain_cert(3) rather thanschwarze2019-04-091-12/+11
* Document SSL_CTX_clear_mode(3) and SSL_clear_mode(3).schwarze2019-04-091-22/+48
* exitting -> exitingtb2019-04-071-1/+1
* Revert tasn_prn.c r1.18.jsing2019-04-071-6/+2
* whitespace consistencytb2019-04-051-1/+2
* Add SERVER_HELLO_RETRY statetb2019-04-051-1/+7
* By design, our state machine is a DAG contrary to the state machine intb2019-04-054-7/+29
* Import SSL_CTX_add1_chain_cert(3) from OpenSSL branch 1.1.1, which is stillschwarze2019-04-055-17/+264
* Zap two dead #defines that were unused since jsing deleted thetb2019-04-051-5/+1
* I forgot to mark some targets as .PHONYtb2019-04-041-1/+5
* Implement legacy fallback for the TLS 1.3 client.jsing2019-04-043-8/+87
* Clean up the cipher/digest table mess.jsing2019-04-043-179/+45
* Use correct define.jsing2019-04-041-2/+2
* Only assign destlen when src is non-NULL.jsing2019-04-041-3/+4
* Switch to pthread_mutex_init().jsing2019-04-041-3/+5
* Bump libssl/libtls minors due to symbol addition.jsing2019-04-042-2/+2
* Provide SSL chain/cert chain APIs.jsing2019-04-043-2/+161
* This case also needs to be fatal.jsing2019-04-041-1/+2
* update root CAs in cert.pem in sync with Mozillasthen2019-04-041-287/+440
* Avoid some out of bound accesses in aesni_cbc_hmac_sha1_cipher().tb2019-04-031-7/+13
* fix broken commentsthen2019-04-021-1/+1
* Sort.jsing2019-04-011-3/+3
* Make the openssl(1) enc -iter flag actually work.jsing2019-04-011-2/+2
* Add a mutex to guard reference counting for tls_config.jsing2019-04-013-4/+16
* Implement a print function for BIGNUM_it.jsing2019-04-011-2/+18
* Correct the return values from long_print.jsing2019-04-011-2/+5
* Require all ASN1_PRIMITIVE_FUNCS functions to be provided.jsing2019-04-015-26/+42
* mark ERR_R_INTERNAL_ERROR instead of assert or _exit, sighderaadt2019-04-011-3/+3
* Correct subtle bug in sigalgs, only care about curve_nid if we arebeck2019-04-011-4/+4
* Clean up and simplify the client verify code:jsing2019-03-311-50/+49
* Wrap long lines and apply some style(9).jsing2019-03-311-7/+10
* Use named field initialisers.jsing2019-03-312-16/+18
* Use correct capitalization of EC_GROUP_get_curve_GF{2m,p}(3).tb2019-03-291-4/+4
* Enable GOST cipher selection test after libssl has been fixed.bluhm2019-03-281-6/+1
* Cast nonce bytes to avoid undefined behaviour when left shifting.jsing2019-03-271-3/+3
* remove duplicate set key file call. from alf.tedu2019-03-271-3/+1
* bump to 2.9.1bcook2019-03-271-3/+3
* Use limits.h instead of sys/limits.h for portability.jsing2019-03-261-3/+2
* Update regress following sigalgs changes.jsing2019-03-251-17/+1
* Strip out all of the pkey to sigalg and sigalg to pkey linkages.jsing2019-03-255-59/+8
* tls1_process_sigalgs() is no longer needed.jsing2019-03-252-57/+2
* Defer sigalgs selection until the certificate is known.jsing2019-03-259-48/+124
* Rework ssl_ctx_use_certificate_chain_bio() to use the CERT_PKEY chain.jsing2019-03-251-46/+26
* Remove ssl_get_server_send_cert() which is now unused.jsing2019-03-252-14/+2
* Rework ssl3_output_cert_chain() to take a CERT_PKEY and consider chains.jsing2019-03-254-40/+36
* Add a chain member to CERT_PKEY and provide functions for manipulating it.jsing2019-03-252-3/+74