summaryrefslogtreecommitdiff
path: root/src/lib/libssl/man (unfollow)
Commit message (Expand)AuthorFilesLines
2020-08-17Unbreak bidirectional SSL_shutdown for TLSv1.3libressl-v3.1.4tb1-1/+2
2020-08-10LibreSSL 3.1.4 - Interoperability and bug fixes for the TLSv1.3 client:tb10-96/+221
2020-06-10OpenBSD 6.7 errata 010, June 11, 2020 (6.7/010_x509.patch.sig)libressl-v3.1.3tb1-8/+29
2020-05-21LibreSSL 3.1.2bcook1-3/+3
2020-05-19OpenBSD 6.7 errata 004 6.7/004_libssl.patch.siglibressl-v3.1.2tb3-3/+15
2020-05-06Bump LibreSSL version to 3.1.1tb1-3/+3
2020-05-04Use a larger (2048 bit) RSA test key.jsing1-1/+63
2020-05-04Fix out-of-bounds access in tables[][] that was exposed in bluhm'stb1-6/+8
2020-05-03Accept two ChangeCipherSpec messages during a TLSv1.3 handshake.jsing1-3/+3
2020-05-02Add const to TLS1.3 internal vectorsinoguchi2-14/+14
2020-04-30Disallow setting the AES-GCM IV length to 0tb1-1/+5
2020-04-29tls13_record_layer internal functions to static in libsslinoguchi1-4/+4
2020-04-29tls13_handshake internal functions to static in libsslinoguchi1-11/+12
2020-04-28Move legacy stack interfacing functions into tls13_legacy.c.jsing4-199/+206
2020-04-28Rename tls13_client_synthetic_handshake_message() and move to tls13_lib.c.jsing3-47/+48
2020-04-27Shuffle some functions around.jsing2-329/+328
2020-04-27Fix two bugs in the AES-CBC-PKCS5 tests that didn't hide failing tests:tb1-3/+3
2020-04-27Fix a logic error that hid the failing ZeroLengthIv tests.tb1-3/+3
2020-04-27Disallow the use of zero length IVs in AES-GCM viatb3-3/+15
2020-04-26Minimal maintenance to make this mess slightly less confusing:schwarze1-10/+10
2020-04-26fix the description; from andras farkasjmc1-5/+4
2020-04-26Display TLSv1.3 extension type with openssl(1) -tlsextdebuginoguchi1-7/+49
2020-04-26s_client: fix use of possibly uninitialized valuesinoguchi1-2/+2
2020-04-25A comma is not appropriate here, use a semicolonjca1-2/+2
2020-04-25In s_server.c rev. 1.33, jsing added support for "openssl s_server -groups";schwarze1-6/+18
2020-04-25Switch to NEGOTIATED when using WITHOUT_HRR.jsing1-4/+9
2020-04-25Discourage use of RES_USE_INET6jca1-1/+5
2020-04-25Fix RES_USE_INET6 descriptionjca1-7/+9
2020-04-25Move unsupported, obsolete ciphers and deprecated aliases out ofschwarze1-31/+29
2020-04-25tweak the wording to make it clearer under which conditions exactlyschwarze1-4/+4
2020-04-22Revise regress to match state transition changes.jsing1-11/+13
2020-04-22Improve TLSv1.3 state machine for HelloRetryRequest handling.jsing5-66/+104
2020-04-21Handle TLSv1.3 key shares other than X25519 on the server side.jsing2-16/+34
2020-04-21Consolidate TLSv1.3 constants.jsing3-40/+47
2020-04-19Add -groups option to openssl(1) s_server.jsing2-35/+31
2020-04-19Provide TLSv1.3 cipher suite aliases to match the names used in RFC 8446.jsing1-2/+25
2020-04-18Fix wrapping/indentation.jsing1-4/+3
2020-04-18Expose the peer ephemeral public key used for TLSv1.3 key exchange.jsing5-36/+79
2020-04-18Tweak previous active cipher suite code.jsing1-6/+5
2020-04-18Allow more key share groups for TLSv1.3.jsing1-21/+12
2020-04-17Only include TLSv1.3 cipher suites if there are active cipher suites.jsing1-2/+10
2020-04-17Update key share regress to match previous change.jsing1-4/+4
2020-04-17Generate client key share using our preferred group.jsing4-25/+37
2020-04-16Remove AUTHORS section. This follows what is done in strstr.3claudio1-4/+2
2020-04-16Replace the simple memmem() implementation with a version that is O(n)claudio1-47/+167
2020-04-16Resync our strstr.c with the musl version. Removes some debug code andclaudio1-11/+3
2020-04-14Update in several respects:schwarze1-13/+11
2020-04-14add the missing sentence "LibreSSL no longer provides any suchschwarze1-2/+3
2020-04-14Delete the three sentences listing the ciphers currently includedschwarze1-15/+2
2020-04-11Document the TLSv1.3 control word, update the description of theschwarze1-4/+30