summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
* Don't leave stale sequence numbers behind in ssl3_clear()libressl-v3.2.5tb2021-03-152-5/+13
* This is errata/6.8/013_libressl.patch.siglibressl-v3.2.4tb2021-02-039-23/+162
* Call dtls1_hm_fragment_free() from dtls1_drain_fragments()jsing2020-09-262-8/+7
* Have dtls1_new() call dtls1_free() on failure.jsing2020-09-261-36/+22
* Have dtls1_hm_fragment_new() call dtls1_hm_fragment_free() on failure.jsing2020-09-261-26/+17
* Refactor dtls1_clear_queues()tb2020-09-261-25/+26
* Simplify the cleanup of init_buf via a ssl3_release_init_buffer() function.jsing2020-09-245-16/+22
* Release read and write buffers using freezero().jsing2020-09-244-21/+26
* Comment out SSL_get0_peername(3) for the OpenBSD 6.8 releaseschwarze2020-09-221-4/+18
* reword ambiguous title line;schwarze2020-09-221-3/+3
* s/before the handshake is complete/during the handshake/gschwarze2020-09-211-8/+7
* two wording tweaks suggested by jsing@, adding clarityschwarze2020-09-211-5/+4
* In ssl.h rev. 1.174 to 1.176, tb@ added some stubs related to 0-RTT data.schwarze2020-09-213-4/+183
* Document the public function SSL_set_SSL_CTX(3) from scratch,schwarze2020-09-203-3/+72
* Add guards around SSL_get0_peername that were accidentally omitted.tb2020-09-201-1/+3
* Prepare to provide SSL_get0_peernametb2020-09-192-2/+9
* Prepare to provide stubbed out versions for reading/writing 0-RTT datatb2020-09-192-2/+41
* Prepare to provide SSL{,_CTX}_{get,set}_max_early_datatb2020-09-192-2/+34
* Prepare to provide SSL_SESSION_{set,get}_max_early_data()tb2020-09-192-2/+18
* If ssl_cert_dup() fails in SSL_set_SSL_CTX(3), return failureschwarze2020-09-181-5/+10
* add forgotten link to newish page SSL_set1_host(3)schwarze2020-09-181-3/+4
* Prepare to provide SSL_get_peer_tmp_key().jsing2020-09-172-9/+20
* Simplify SSL method lookups.jsing2020-09-175-66/+44
* Install the new page SSL_set1_host(3), link to it from relevant places,schwarze2020-09-174-12/+17
* Import a manual page for SSL_set1_host(3), which we already have since 6.5,schwarze2020-09-171-0/+155
* Group seal record functions together.jsing2020-09-161-11/+11
* Let SSL_CTX_get_ciphers(NULL) return NULL rather than crashschwarze2020-09-162-6/+7
* Mark SSL_get_cipher_list(3) as deprecated; it is badly misnamed, and thereschwarze2020-09-161-4/+6
* Avoid memset() before memcpy() for CBB_add_bytes().jsing2020-09-161-2/+2
* The undocumented public function SSL_set_SSL_CTX(3) changes theschwarze2020-09-151-4/+4
* Split the tls12_record_layer_write_mac() function.jsing2020-09-151-10/+19
* Do not destroy an existing cipher list when ssl_parse_ciphersuites()schwarze2020-09-151-4/+2
* Correct a failure case in tls12_record_layer_seal_record_protected()jsing2020-09-151-2/+2
* Create the missing RETURN VALUES section and move the appropriateschwarze2020-09-151-57/+103
* Cleanup/simplify SSL_set_ssl_method().jsing2020-09-151-18/+18
* Mop up the get_ssl_method function pointer.jsing2020-09-152-50/+2
* Move state initialisation from SSL_clear() to ssl3_clear().jsing2020-09-142-4/+4
* Cleanup and simplify SSL_set_session().jsing2020-09-141-36/+22
* Avoid NULL deref SSL_{,CTX_}set_ciphersuitestb2020-09-141-2/+2
* Implement SSL_{CTX_,}set_ciphersuites().jsing2020-09-135-13/+211
* Improve handling of BIO_read()/BIO_write() failures in the TLSv1.3 stack.jsing2020-09-131-1/+9
* Use the correct type for tls1_set_ec_id()tb2020-09-121-3/+3
* Simplify tls1_set_ec_id() a bittb2020-09-121-24/+19
* Remove cipher_list_by_id.jsing2020-09-117-89/+32
* Simplify SSL_get_ciphers().jsing2020-09-111-13/+7
* Rename ssl_cipher_is_permitted()jsing2020-09-113-10/+10
* Some SSL_AD_* defines snuck into the TLSv1.3 code - replace them withjsing2020-09-112-10/+10
* Various ciphers related clean up.jsing2020-09-111-41/+36
* Set alpn_selected_len = 0 when alpn_selected is NULLinoguchi2020-09-091-1/+4
* Garbage collect renew_ticket in tls_decrypt_tickettb2020-09-071-8/+5