summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Add read and write support to tls_buffer.jsing2022-07-224-13/+139
* Simplify tls13_server_encrypted_extensions_recvtb2022-07-221-8/+2
* Remove redundant length checks in parse functionstb2022-07-221-21/+1
* Simplify tlsext_supported_groups_server_parsetb2022-07-201-45/+31
* Drop some unnecessary parentheses.tb2022-07-201-3/+2
* Copy alpn_selected using CBStb2022-07-201-6/+7
* Copy alpn_client_proto_list using CBS in SSL_new()tb2022-07-201-12/+7
* Validate protocols in SSL{_CTX,}_set_alpn_protos()tb2022-07-201-1/+12
* Rewrite SSL{_CTX,}_set_alpn_protos() using CBStb2022-07-201-23/+15
* Change various ALPN related internal struct memberstb2022-07-201-6/+6
* Factor out ALPN extension format checktb2022-07-202-14/+27
* Remove tls_buffer_set_data() and remove/revise callers.jsing2022-07-206-34/+14
* Correct server-side handling of TLSv1.3 key updates.jsing2022-07-201-20/+30
* Disallow MD5 and SHA-1 HMACs depending on the security leveltb2022-07-191-2/+11
* Disable TLSv1.3 middlebox compatibility mode for QUIC connections.jsing2022-07-171-2/+3
* Pass SSL pointer to tls13_ctx_new().jsing2022-07-173-15/+11
* Correct handling of QUIC transport parameters extension.jsing2022-07-171-48/+16
* Provide SSL_is_quic()jsing2022-07-173-5/+14
* Correct TLSEXT_TYPE_quic_transport_parameters message types.jsing2022-07-171-2/+2
* Correct value for TLSEXT_TYPE_quic_transport_parametersjsing2022-07-171-4/+6
* AESCGM -> AESGCMjsg2022-07-171-4/+4
* add .Xr links to SSL_CTX_set_security_level(3)schwarze2022-07-135-15/+20
* Start documenting our new pet octopus, SSL_CTX_set_security_level(3).schwarze2022-07-132-1/+161
* Remove #ifndef around the definition of OPENSSL_TLS_SECURITY_LEVEL.tb2022-07-131-3/+1
* Remove mkerr.pl remnants from LibreSSLkn2022-07-122-12/+2
* Annotate the security callback and the security ex_data as deliberatelytb2022-07-101-3/+3
* sorttb2022-07-071-1/+1
* Make CBB_finish() fail if *out_data is not NULLtb2022-07-071-1/+4
* Initialize hkdf_label to NULL.tb2022-07-071-2/+2
* Use a local bits variable to avoid ugly line break due to nested functiontb2022-07-071-6/+16
* Unifdef LIBRESSL_HAS_SECURITY_LEVEL and remove some workaroundstb2022-07-073-35/+4
* Bump minor after symbol additiontb2022-07-071-1/+1
* Update Symbols.listtb2022-07-071-0/+4
* Expose security level symbols and error codes in the headers.tb2022-07-072-6/+2
* Use secop instead of op everywheretb2022-07-051-15/+15
* Pull setting of is_ee out of the function calls to appease scan-buildtb2022-07-051-3/+5
* Reword a commenttb2022-07-031-2/+2
* Unwrap a linetb2022-07-031-3/+2
* Simplify certificate list handling code in legacy server.jsing2022-07-031-62/+50
* Simplify certificate list handling code in legacy client.jsing2022-07-031-45/+33
* Simplify tls1_ec_nid2group_id()tb2022-07-031-98/+10
* Simplify tls1_ec_group_id2{bits,nid}()tb2022-07-031-9/+9
* Call certificate variables cert and certs, rather than x and skjsing2022-07-021-6/+6
* Stop using ssl{_ctx,}_security() outside of ssl_seclevel.ctb2022-07-027-23/+60
* Rename uses 'curve' to 'group' and rework tls1 group API.tb2022-07-0212-162/+204
* Fix off-by-one in length check.tb2022-07-021-3/+3
* Make tls1_ec_curve_id2nid() return explicit NID_undef instead of 0 on errortb2022-07-022-5/+5
* Remove redundant commentstb2022-06-301-30/+30
* Check security level for supported groups.tb2022-06-304-35/+179
* Rename variable from tls_version to version since it could also betb2022-06-301-3/+3