summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
* In LibreSSL, printing a certificate can result in a crash inlibressl-v3.2.6benno2021-08-201-3/+3
* Don't leave stale sequence numbers behind in ssl3_clear()libressl-v3.2.5tb2021-03-152-5/+13
* This is errata/6.8/013_libressl.patch.siglibressl-v3.2.4tb2021-02-0312-28/+172
* Fix a NULL dereference in GENERAL_NAME_cmp()libressl-v3.2.3tb2020-12-086-11/+94
* This commit was manufactured by cvs2git to create branch 'OPENBSD_6_8'.libressl-v3.2.2cvs2svn2020-09-260-0/+0
* Ensure leaf is set up on X509_STORE_CTX before verification.jsing2020-09-261-9/+7
* Call dtls1_hm_fragment_free() from dtls1_drain_fragments()jsing2020-09-262-8/+7
* Have dtls1_new() call dtls1_free() on failure.jsing2020-09-261-36/+22
* Have dtls1_hm_fragment_new() call dtls1_hm_fragment_free() on failure.jsing2020-09-261-26/+17
* Refactor dtls1_clear_queues()tb2020-09-261-25/+26
* jumping into the x509 fray with a bunch of whitespace repairderaadt2020-09-261-6/+6
* move test-tls13-finished.py from slow tests to normal tests.tb2020-09-251-27/+26
* bump to LibreSSL 3.2.2 ahead of lockbcook2020-09-251-3/+3
* KNF for a few comments and indent a labeltb2020-09-251-8/+12
* Remove some dangling elses for consistency with the rest of the filetb2020-09-251-25/+19
* Simplify UI_new_method()tb2020-09-251-10/+4
* Move variable declaration to the top of UI_set_result and ditchtb2020-09-251-19/+16
* The default branch of a switch somehow got moved inside of a pointlesstb2020-09-251-3/+3
* Simplify call to ERR_print_errors_cb()tb2020-09-251-5/+4
* test-tls13-finished.py has 70 failing tests that expect a "decode_error"tb2020-09-251-6/+94
* delete a stale commenttb2020-09-251-5/+1
* Error out if ok_chars and cancel_chars overlaptb2020-09-241-2/+4
* Fix a number of leaks in the UI_dup_* functionstb2020-09-241-143/+99
* Push ERR_R_MALLOC_FAILURE onto the error stacktb2020-09-241-3/+3
* Make free_strings() NULL safetb2020-09-241-1/+3
* KNF and grammar tweaks for comments; wrap a few overlong prototypes.tb2020-09-241-163/+188
* Simplify the cleanup of init_buf via a ssl3_release_init_buffer() function.jsing2020-09-245-16/+22
* Release read and write buffers using freezero().jsing2020-09-244-21/+26
* Ensure chain is set on the X509_STORE_CTX before triggering callback.jsing2020-09-231-12/+39
* Comment out SSL_get0_peername(3) for the OpenBSD 6.8 releaseschwarze2020-09-221-4/+18
* reword ambiguous title line;schwarze2020-09-221-3/+3
* s/before the handshake is complete/during the handshake/gschwarze2020-09-211-8/+7
* 1) Move the interop tests to the end so we see tlsfuzzer firstbeck2020-09-215-9/+35
* two wording tweaks suggested by jsing@, adding clarityschwarze2020-09-211-5/+4
* In ssl.h rev. 1.174 to 1.176, tb@ added some stubs related to 0-RTT data.schwarze2020-09-213-4/+183
* move a misplaced 'goto done;' so that all invalid uris are testedtb2020-09-211-1/+1
* add a few short invalid URIs in test_constraints1() that cause earlytb2020-09-211-0/+4
* Fix some line wrapping and other whitespace issues.tb2020-09-211-45/+34
* Move freeing and zeroing up to right after the while loop.tb2020-09-211-5/+5
* Avoid memleak caused by shadowingtb2020-09-201-2/+5
* KNF/whitespace nitstb2020-09-202-6/+7
* Correct a 1 byte read overflow in x509_contraints_uri and addbeck2020-09-202-4/+13
* Document the public function SSL_set_SSL_CTX(3) from scratch,schwarze2020-09-203-3/+72
* Add guards around SSL_get0_peername that were accidentally omitted.tb2020-09-201-1/+3
* Fix a memory leak in x509_constraints_extract_namestb2020-09-201-6/+6
* remove superfluous NULL checkbeck2020-09-191-2/+2
* Prepare to provide SSL_get0_peernametb2020-09-192-2/+9
* Prepare to provide stubbed out versions for reading/writing 0-RTT datatb2020-09-192-2/+41
* Prepare to provide SSL{,_CTX}_{get,set}_max_early_datatb2020-09-192-2/+34
* Prepare to provide SSL_SESSION_{set,get}_max_early_data()tb2020-09-192-2/+18