summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
* This commit was manufactured by cvs2git to create branch 'OPENBSD_6_7'.libressl-v3.1.1cvs2svn2020-05-060-0/+0
* Bump LibreSSL version to 3.1.1tb2020-05-061-3/+3
* Use a larger (2048 bit) RSA test key.jsing2020-05-041-1/+63
* Fix out-of-bounds access in tables[][] that was exposed in bluhm'stb2020-05-041-6/+8
* Accept two ChangeCipherSpec messages during a TLSv1.3 handshake.jsing2020-05-031-3/+3
* Add const to TLS1.3 internal vectorsinoguchi2020-05-022-14/+14
* Disallow setting the AES-GCM IV length to 0tb2020-04-301-1/+5
* tls13_record_layer internal functions to static in libsslinoguchi2020-04-291-4/+4
* tls13_handshake internal functions to static in libsslinoguchi2020-04-291-11/+12
* Move legacy stack interfacing functions into tls13_legacy.c.jsing2020-04-284-199/+206
* Rename tls13_client_synthetic_handshake_message() and move to tls13_lib.c.jsing2020-04-283-47/+48
* Shuffle some functions around.jsing2020-04-272-329/+328
* Fix two bugs in the AES-CBC-PKCS5 tests that didn't hide failing tests:tb2020-04-271-3/+3
* Fix a logic error that hid the failing ZeroLengthIv tests.tb2020-04-271-3/+3
* Disallow the use of zero length IVs in AES-GCM viatb2020-04-273-3/+15
* Minimal maintenance to make this mess slightly less confusing:schwarze2020-04-261-10/+10
* fix the description; from andras farkasjmc2020-04-261-5/+4
* Display TLSv1.3 extension type with openssl(1) -tlsextdebuginoguchi2020-04-261-7/+49
* s_client: fix use of possibly uninitialized valuesinoguchi2020-04-261-2/+2
* A comma is not appropriate here, use a semicolonjca2020-04-251-2/+2
* In s_server.c rev. 1.33, jsing added support for "openssl s_server -groups";schwarze2020-04-251-6/+18
* Switch to NEGOTIATED when using WITHOUT_HRR.jsing2020-04-251-4/+9
* Discourage use of RES_USE_INET6jca2020-04-251-1/+5
* Fix RES_USE_INET6 descriptionjca2020-04-251-7/+9
* Move unsupported, obsolete ciphers and deprecated aliases out ofschwarze2020-04-251-31/+29
* tweak the wording to make it clearer under which conditions exactlyschwarze2020-04-251-4/+4
* Revise regress to match state transition changes.jsing2020-04-221-11/+13
* Improve TLSv1.3 state machine for HelloRetryRequest handling.jsing2020-04-225-66/+104
* Handle TLSv1.3 key shares other than X25519 on the server side.jsing2020-04-212-16/+34
* Consolidate TLSv1.3 constants.jsing2020-04-213-40/+47
* Add -groups option to openssl(1) s_server.jsing2020-04-192-35/+31
* Provide TLSv1.3 cipher suite aliases to match the names used in RFC 8446.jsing2020-04-191-2/+25
* Fix wrapping/indentation.jsing2020-04-181-4/+3
* Expose the peer ephemeral public key used for TLSv1.3 key exchange.jsing2020-04-185-36/+79
* Tweak previous active cipher suite code.jsing2020-04-181-6/+5
* Allow more key share groups for TLSv1.3.jsing2020-04-181-21/+12
* Only include TLSv1.3 cipher suites if there are active cipher suites.jsing2020-04-171-2/+10
* Update key share regress to match previous change.jsing2020-04-171-4/+4
* Generate client key share using our preferred group.jsing2020-04-174-25/+37
* Remove AUTHORS section. This follows what is done in strstr.3claudio2020-04-161-4/+2
* Replace the simple memmem() implementation with a version that is O(n)claudio2020-04-161-47/+167
* Resync our strstr.c with the musl version. Removes some debug code andclaudio2020-04-161-11/+3
* Update in several respects:schwarze2020-04-141-13/+11
* add the missing sentence "LibreSSL no longer provides any suchschwarze2020-04-141-2/+3
* Delete the three sentences listing the ciphers currently includedschwarze2020-04-141-15/+2
* Document the TLSv1.3 control word, update the description of theschwarze2020-04-111-4/+30
* sync cert.pem with Mozilla's root ca list, ok beck@sthen2020-04-101-276/+343
* When printing the serialNumber, fall back to the colon separated hextb2020-04-101-2/+4
* Revise test to handle the fact that TLSv1.3 cipher suites are now beingjsing2020-04-091-2/+4
* Include TLSv1.3 cipher suites unless cipher string references TLSv1.3.jsing2020-04-091-6/+19