index
:
openbsd
OPENBSD_2_0
OPENBSD_2_1
OPENBSD_2_2
OPENBSD_2_3
OPENBSD_2_4
OPENBSD_2_5
OPENBSD_2_6
OPENBSD_2_7
OPENBSD_2_8
OPENBSD_2_9
OPENBSD_3_0
OPENBSD_3_1
OPENBSD_3_2
OPENBSD_3_3
OPENBSD_3_4
OPENBSD_3_5
OPENBSD_3_6
OPENBSD_3_7
OPENBSD_3_8
OPENBSD_3_9
OPENBSD_4_0
OPENBSD_4_1
OPENBSD_4_2
OPENBSD_4_3
OPENBSD_4_4
OPENBSD_4_5
OPENBSD_4_6
OPENBSD_4_7
OPENBSD_4_8
OPENBSD_4_9
OPENBSD_5_0
OPENBSD_5_1
OPENBSD_5_2
OPENBSD_5_3
OPENBSD_5_4
OPENBSD_5_5
OPENBSD_5_6
OPENBSD_5_7
OPENBSD_5_8
OPENBSD_5_9
OPENBSD_6_0
OPENBSD_6_1
OPENBSD_6_2
OPENBSD_6_3
OPENBSD_6_4
OPENBSD_6_5
OPENBSD_6_6
OPENBSD_6_7
OPENBSD_6_8
OPENBSD_6_9
OPENBSD_7_0
OPENBSD_7_1
OPENBSD_7_2
OPENBSD_7_3
OPENBSD_7_4
OPENBSD_7_5
OPENBSD_7_6
master
A mirror of https://github.com/libressl/openbsd.git
summary
refs
log
tree
commit
diff
log msg
author
committer
range
Commit message (
Expand
)
Author
Age
Files
Lines
*
This commit was manufactured by cvs2git to create branch 'OPENBSD_6_7'.
libressl-v3.1.1
cvs2svn
2020-05-06
0
-0
/
+0
*
Bump LibreSSL version to 3.1.1
tb
2020-05-06
1
-3
/
+3
*
Use a larger (2048 bit) RSA test key.
jsing
2020-05-04
1
-1
/
+63
*
Fix out-of-bounds access in tables[][] that was exposed in bluhm's
tb
2020-05-04
1
-6
/
+8
*
Accept two ChangeCipherSpec messages during a TLSv1.3 handshake.
jsing
2020-05-03
1
-3
/
+3
*
Add const to TLS1.3 internal vectors
inoguchi
2020-05-02
2
-14
/
+14
*
Disallow setting the AES-GCM IV length to 0
tb
2020-04-30
1
-1
/
+5
*
tls13_record_layer internal functions to static in libssl
inoguchi
2020-04-29
1
-4
/
+4
*
tls13_handshake internal functions to static in libssl
inoguchi
2020-04-29
1
-11
/
+12
*
Move legacy stack interfacing functions into tls13_legacy.c.
jsing
2020-04-28
4
-199
/
+206
*
Rename tls13_client_synthetic_handshake_message() and move to tls13_lib.c.
jsing
2020-04-28
3
-47
/
+48
*
Shuffle some functions around.
jsing
2020-04-27
2
-329
/
+328
*
Fix two bugs in the AES-CBC-PKCS5 tests that didn't hide failing tests:
tb
2020-04-27
1
-3
/
+3
*
Fix a logic error that hid the failing ZeroLengthIv tests.
tb
2020-04-27
1
-3
/
+3
*
Disallow the use of zero length IVs in AES-GCM via
tb
2020-04-27
3
-3
/
+15
*
Minimal maintenance to make this mess slightly less confusing:
schwarze
2020-04-26
1
-10
/
+10
*
fix the description; from andras farkas
jmc
2020-04-26
1
-5
/
+4
*
Display TLSv1.3 extension type with openssl(1) -tlsextdebug
inoguchi
2020-04-26
1
-7
/
+49
*
s_client: fix use of possibly uninitialized values
inoguchi
2020-04-26
1
-2
/
+2
*
A comma is not appropriate here, use a semicolon
jca
2020-04-25
1
-2
/
+2
*
In s_server.c rev. 1.33, jsing added support for "openssl s_server -groups";
schwarze
2020-04-25
1
-6
/
+18
*
Switch to NEGOTIATED when using WITHOUT_HRR.
jsing
2020-04-25
1
-4
/
+9
*
Discourage use of RES_USE_INET6
jca
2020-04-25
1
-1
/
+5
*
Fix RES_USE_INET6 description
jca
2020-04-25
1
-7
/
+9
*
Move unsupported, obsolete ciphers and deprecated aliases out of
schwarze
2020-04-25
1
-31
/
+29
*
tweak the wording to make it clearer under which conditions exactly
schwarze
2020-04-25
1
-4
/
+4
*
Revise regress to match state transition changes.
jsing
2020-04-22
1
-11
/
+13
*
Improve TLSv1.3 state machine for HelloRetryRequest handling.
jsing
2020-04-22
5
-66
/
+104
*
Handle TLSv1.3 key shares other than X25519 on the server side.
jsing
2020-04-21
2
-16
/
+34
*
Consolidate TLSv1.3 constants.
jsing
2020-04-21
3
-40
/
+47
*
Add -groups option to openssl(1) s_server.
jsing
2020-04-19
2
-35
/
+31
*
Provide TLSv1.3 cipher suite aliases to match the names used in RFC 8446.
jsing
2020-04-19
1
-2
/
+25
*
Fix wrapping/indentation.
jsing
2020-04-18
1
-4
/
+3
*
Expose the peer ephemeral public key used for TLSv1.3 key exchange.
jsing
2020-04-18
5
-36
/
+79
*
Tweak previous active cipher suite code.
jsing
2020-04-18
1
-6
/
+5
*
Allow more key share groups for TLSv1.3.
jsing
2020-04-18
1
-21
/
+12
*
Only include TLSv1.3 cipher suites if there are active cipher suites.
jsing
2020-04-17
1
-2
/
+10
*
Update key share regress to match previous change.
jsing
2020-04-17
1
-4
/
+4
*
Generate client key share using our preferred group.
jsing
2020-04-17
4
-25
/
+37
*
Remove AUTHORS section. This follows what is done in strstr.3
claudio
2020-04-16
1
-4
/
+2
*
Replace the simple memmem() implementation with a version that is O(n)
claudio
2020-04-16
1
-47
/
+167
*
Resync our strstr.c with the musl version. Removes some debug code and
claudio
2020-04-16
1
-11
/
+3
*
Update in several respects:
schwarze
2020-04-14
1
-13
/
+11
*
add the missing sentence "LibreSSL no longer provides any such
schwarze
2020-04-14
1
-2
/
+3
*
Delete the three sentences listing the ciphers currently included
schwarze
2020-04-14
1
-15
/
+2
*
Document the TLSv1.3 control word, update the description of the
schwarze
2020-04-11
1
-4
/
+30
*
sync cert.pem with Mozilla's root ca list, ok beck@
sthen
2020-04-10
1
-276
/
+343
*
When printing the serialNumber, fall back to the colon separated hex
tb
2020-04-10
1
-2
/
+4
*
Revise test to handle the fact that TLSv1.3 cipher suites are now being
jsing
2020-04-09
1
-2
/
+4
*
Include TLSv1.3 cipher suites unless cipher string references TLSv1.3.
jsing
2020-04-09
1
-6
/
+19
[next]