summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
...
* Add additional checks to ssl3_send_client_key_exchange() that ensuresjsing2015-02-062-36/+50
* Import BoringSSL's crypto bytestring and crypto bytebuilder APIs.doug2015-02-0612-2/+3359
* Add libssl ciphers regress, which currently only coversjsing2015-02-063-1/+130
* Bring back the horrible API that is get_cipher_by_char/put_cipher_by_char.jsing2015-02-0628-30/+176
* Rename SSL_CTX_use_certificate_chain() to SSL_CTX_use_certificate_chain_mem().reyk2015-02-068-21/+22
* Declare the x509_(mem|file|dir)_lookup symbols as static because theyreyk2015-02-056-12/+12
* Make the TLS connect and accept error messages consistent.bluhm2015-01-302-5/+4
* Use .Rv where appropriate, and move it to RETURN VALUES;schwarze2015-01-293-27/+13
* dial the time back to about 0.1s, closer to the original targets andtedu2015-01-281-4/+4
* Fix a number of issues relating to algorithms in signatures, Mostlybeck2015-01-2814-18/+116
* Place the remainder of e_os2.h under #ifndef LIBRESSL_INTERNAL until we canjsing2015-01-261-1/+5
* Add AEAD as a "MAC alias" so that it is possible to identify/select ciphersjsing2015-01-264-4/+14
* Convert openssl(1) sess_id to the new option handling.doug2015-01-241-88/+113
* Convert openssl(1)'s rsa.c to the new option handling code.doug2015-01-241-184/+251
* Ensure that a ServerKeyExchange message is received if the selected cipherjsing2015-01-232-10/+36
* Use field names in struct initialisers.jsing2015-01-226-66/+66
* last entry in NAME should not have a trailing comma;jmc2015-01-221-2/+2
* Add MLINK for tls_config_set_ca_mem()reyk2015-01-221-1/+2
* Allow to to load the CA chain directly from memory instead ofreyk2015-01-226-8/+39
* Support CA verification in chroot'ed processes without direct filereyk2015-01-226-6/+20
* Add X509_STORE_load_mem() to load certificates from a memory bufferreyk2015-01-229-8/+338
* Make it obvious which openssl test complained and whether it was expected.doug2015-01-221-2/+5
* Assume that the size of a pointer will not change at runtime.bcook2015-01-222-56/+30
* Fix DTLS memory leak (CVE-2015-0206).libressl-v2.1.3doug2015-01-212-18/+46
* Missing $OpenBSD$'s.krw2015-01-205-0/+5
* Add arc4random/getentropy shims for NetBSD.bcook2015-01-194-0/+300
* Improve wording in alloca.tedu2015-01-171-7/+5
* Use ">", not ">=" when comparing length to HOST_NAME_MAX sincemillert2015-01-161-3/+3
* Replace HOST_NAME_MAX+1-1 with HOST_NAME_MAX. OK deraad@millert2015-01-162-8/+8
* Replace check for ">= HOST_NAME_MAX+1" with "> HOST_NAME_MAX".millert2015-01-161-1/+1
* Move to the <limits.h> universe.deraadt2015-01-1623-57/+40
* The SSL/TLS session Id context is limited to 32 bytes. Instead ofreyk2015-01-161-1/+13
* Delete the MANLINT variable and the related SUFFIXES rules becauseschwarze2015-01-162-4/+4
* remove unused variablechl2015-01-151-2/+1
* back in september I did the large abstraction refactoring to allow thesederaadt2015-01-1514-14/+28
* Make strlcpy/strlcat slightly easier to read.millert2015-01-154-86/+82
* For non-blocking sockets tls_connect_fds() could fail with EAGAIN.bluhm2015-01-132-7/+22
* Document the openssl s_client -proxy feature.bluhm2015-01-131-2/+14
* Add the possibility to use the openssl s_client tool with an httpbluhm2015-01-131-4/+24
* Implement more thorough error checks:lteo2015-01-131-12/+38
* rename blocks to words. bcrypt "blocks" are unrelated to blowfish blocks,tedu2015-01-121-9/+9
* Fix a memory leak in bss_dgram.doug2015-01-122-6/+26
* Convert spkac.c to the new option handling code.doug2015-01-081-100/+137
* Convert pkcs8.c to the new option handling code.doug2015-01-081-157/+220
* Convert asn1pars.c to the new option handling.doug2015-01-081-137/+206
* missing , found by Dongsheng Songderaadt2015-01-081-3/+3
* Avoid a double-free in an error path.doug2015-01-082-2/+4
* stupid me. need errno.htedu2015-01-071-1/+2
* set errno = EINVAL for invalid salts and hashes in most functions.tedu2015-01-071-12/+20
* mix in more virtual memory and process informationbcook2015-01-072-4/+8