index
:
openbsd
OPENBSD_2_0
OPENBSD_2_1
OPENBSD_2_2
OPENBSD_2_3
OPENBSD_2_4
OPENBSD_2_5
OPENBSD_2_6
OPENBSD_2_7
OPENBSD_2_8
OPENBSD_2_9
OPENBSD_3_0
OPENBSD_3_1
OPENBSD_3_2
OPENBSD_3_3
OPENBSD_3_4
OPENBSD_3_5
OPENBSD_3_6
OPENBSD_3_7
OPENBSD_3_8
OPENBSD_3_9
OPENBSD_4_0
OPENBSD_4_1
OPENBSD_4_2
OPENBSD_4_3
OPENBSD_4_4
OPENBSD_4_5
OPENBSD_4_6
OPENBSD_4_7
OPENBSD_4_8
OPENBSD_4_9
OPENBSD_5_0
OPENBSD_5_1
OPENBSD_5_2
OPENBSD_5_3
OPENBSD_5_4
OPENBSD_5_5
OPENBSD_5_6
OPENBSD_5_7
OPENBSD_5_8
OPENBSD_5_9
OPENBSD_6_0
OPENBSD_6_1
OPENBSD_6_2
OPENBSD_6_3
OPENBSD_6_4
OPENBSD_6_5
OPENBSD_6_6
OPENBSD_6_7
OPENBSD_6_8
OPENBSD_6_9
OPENBSD_7_0
OPENBSD_7_1
OPENBSD_7_2
OPENBSD_7_3
OPENBSD_7_4
OPENBSD_7_5
OPENBSD_7_6
master
A mirror of https://github.com/libressl/openbsd.git
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
src
/
lib
/
libssl
(
follow
)
Commit message (
Expand
)
Author
Age
Files
Lines
*
Unbreak bidirectional SSL_shutdown for TLSv1.3
libressl-v3.1.4
tb
2020-08-17
1
-1
/
+2
*
LibreSSL 3.1.4 - Interoperability and bug fixes for the TLSv1.3 client:
tb
2020-08-10
8
-66
/
+189
*
OpenBSD 6.7 errata 004 6.7/004_libssl.patch.sig
libressl-v3.1.2
tb
2020-05-19
3
-3
/
+15
*
Accept two ChangeCipherSpec messages during a TLSv1.3 handshake.
jsing
2020-05-03
1
-3
/
+3
*
Add const to TLS1.3 internal vectors
inoguchi
2020-05-02
2
-14
/
+14
*
tls13_record_layer internal functions to static in libssl
inoguchi
2020-04-29
1
-4
/
+4
*
tls13_handshake internal functions to static in libssl
inoguchi
2020-04-29
1
-11
/
+12
*
Move legacy stack interfacing functions into tls13_legacy.c.
jsing
2020-04-28
4
-199
/
+206
*
Rename tls13_client_synthetic_handshake_message() and move to tls13_lib.c.
jsing
2020-04-28
3
-47
/
+48
*
Shuffle some functions around.
jsing
2020-04-27
2
-329
/
+328
*
Switch to NEGOTIATED when using WITHOUT_HRR.
jsing
2020-04-25
1
-4
/
+9
*
Move unsupported, obsolete ciphers and deprecated aliases out of
schwarze
2020-04-25
1
-31
/
+29
*
tweak the wording to make it clearer under which conditions exactly
schwarze
2020-04-25
1
-4
/
+4
*
Improve TLSv1.3 state machine for HelloRetryRequest handling.
jsing
2020-04-22
5
-66
/
+104
*
Handle TLSv1.3 key shares other than X25519 on the server side.
jsing
2020-04-21
2
-16
/
+34
*
Consolidate TLSv1.3 constants.
jsing
2020-04-21
3
-40
/
+47
*
Provide TLSv1.3 cipher suite aliases to match the names used in RFC 8446.
jsing
2020-04-19
1
-2
/
+25
*
Fix wrapping/indentation.
jsing
2020-04-18
1
-4
/
+3
*
Expose the peer ephemeral public key used for TLSv1.3 key exchange.
jsing
2020-04-18
5
-36
/
+79
*
Tweak previous active cipher suite code.
jsing
2020-04-18
1
-6
/
+5
*
Allow more key share groups for TLSv1.3.
jsing
2020-04-18
1
-21
/
+12
*
Only include TLSv1.3 cipher suites if there are active cipher suites.
jsing
2020-04-17
1
-2
/
+10
*
Generate client key share using our preferred group.
jsing
2020-04-17
4
-25
/
+37
*
Update in several respects:
schwarze
2020-04-14
1
-13
/
+11
*
add the missing sentence "LibreSSL no longer provides any such
schwarze
2020-04-14
1
-2
/
+3
*
Delete the three sentences listing the ciphers currently included
schwarze
2020-04-14
1
-15
/
+2
*
Document the TLSv1.3 control word, update the description of the
schwarze
2020-04-11
1
-4
/
+30
*
Include TLSv1.3 cipher suites unless cipher string references TLSv1.3.
jsing
2020-04-09
1
-6
/
+19
*
Tidy line wrapping and remove an extra blank line.
jsing
2020-04-09
1
-4
/
+3
*
ssl_aes_is_accelerated() returns a boolean - treat it as such, rather than
jsing
2020-04-09
1
-2
/
+2
*
Ensure legacy session ID is persistent during client TLS session.
jsing
2020-04-08
1
-9
/
+14
*
Send a zero-length session identifier if TLSv1.3 is not enabled.
jsing
2020-04-06
1
-4
/
+7
*
Void functions obviously do not return values; no need to elaborate.
schwarze
2020-03-30
5
-31
/
+10
*
Void functions obviously do not return values; no need to elaborate.
schwarze
2020-03-29
1
-5
/
+2
*
Consistently spell 'unsigned' as 'unsigned int', as style(9) seems
tb
2020-03-16
7
-44
/
+45
*
The RFC is clear (section 5.3) that sequence number should never wrap.
tb
2020-03-16
1
-5
/
+12
*
Remove dtls1_enc().
jsing
2020-03-13
5
-222
/
+11
*
Correct TLSv1.3 sequence number increment and wrapping check.
jsing
2020-03-13
1
-3
/
+3
*
Ensure that CBB_add_space() always provides zeroed memory.
jsing
2020-03-13
1
-1
/
+2
*
Use calloc() rather than malloc() when allocating initial CBB buffer.
jsing
2020-03-12
1
-4
/
+3
*
Use calloc() rather than malloc() when allocating buffers.
jsing
2020-03-12
1
-3
/
+3
*
Stop overloading the record type for padding length.
jsing
2020-03-12
5
-13
/
+10
*
Use internal versions of SSL3_BUFFER, SSL3_RECORD and DTLS1_RECORD_DATA.
jsing
2020-03-12
9
-53
/
+83
*
Use ctx->hs->secrets rather than the S3I(s) version.
jsing
2020-03-10
2
-4
/
+4
*
Remove some unnecessary handshake enums/functions.
jsing
2020-03-10
4
-26
/
+4
*
Add a return value check to tls13_buffer_extend().
jsing
2020-03-10
1
-1
/
+4
*
Remove the enc function pointers.
jsing
2020-03-10
6
-22
/
+12
*
RFC 8446, section 4.1.3: If a TLSv1.2 client receives a ServerHello for
tb
2020-03-06
1
-1
/
+27
*
TLSv1.3 servers that intend to downgrade are required to set the last
tb
2020-03-06
1
-4
/
+8
*
The decryption_failed alert must not be sent by compliant implementations.
tb
2020-02-23
1
-2
/
+2
[next]