summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
* add AES-GCM constants from RFC 7714 for SRTPlandry2021-06-113-4/+20
* SSL3_AD_ILLEGAL_PARAMETER is not a valid SSLerror() reason code.jsing2021-06-111-2/+2
* Indent all labels with a single space.jsing2021-06-1111-44/+44
* Simplify tlsext_ecpf_parse()tb2021-06-081-8/+4
* Rewrap a comment to avoid an overlong linetb2021-06-081-3/+3
* Ignore the record version for early alertstb2021-06-081-4/+10
* TLSv1.3 server: avoid sending alerts in legacy recordstb2021-06-081-3/+4
* Adjust alert for ECPF without uncompressed point formattb2021-06-081-3/+4
* Fix pkg-config .pc files with LibreSSLinoguchi2021-06-081-7/+5
* Absorb SSL_AEAD_CTX into struct tls12_record_protection.jsing2021-05-163-73/+63
* Zero the tls12_record_protection struct instead of individual fields.jsing2021-05-161-9/+3
* Avoid including tls13_internal.h in tls13_record.h.jsing2021-05-161-2/+1
* Avoid pulling ssl_locl.h into self-contained code.jsing2021-05-164-8/+4
* Make local header inclusion consistent.jsing2021-05-1618-51/+36
* Move DTLS structs/definitions/prototypes to dtls_locl.h.jsing2021-05-1614-214/+282
* Add a missing space.jsing2021-05-161-2/+2
* Fix formatting of multi-line license comment per style(9).jsing2021-05-164-8/+12
* Avoid pulling ssl_sigalgs.h in via ssl_locl.h.jsing2021-05-163-4/+7
* Remove unnecessary includes from the bytestring APIs.jsing2021-05-164-14/+4
* Explicitly include <openssl/opensslconf.h> in files using OPENSSL_NO_*jsing2021-05-1613-16/+30
* Merge documentation for SSL_CIPHER_find(3) from OpenSSL 1.1.1.tb2021-05-121-2/+29
* Install SSL_SESSION_get0_cipher.3tb2021-05-121-1/+2
* Document SSL_SESSION_get0_cipher(3)tb2021-05-121-0/+94
* Document SSL_CTX_get_ssl_method(3)tb2021-05-111-4/+15
* bump libssl major after struct visibility changes and symbol additiontb2021-05-101-2/+2
* Make SSL_CIPHER, SSL_CTX, SSL_SESSION, {DTLS1,SSL3}_STATEtb2021-05-103-8/+7
* Provide SSL_SESSION_get0_cipher(3)tb2021-05-103-2/+10
* Provide SSL_CTX_get_ssl_method(3)tb2021-05-103-2/+11
* Provide SSL_CIPHER_find(3)tb2021-05-103-2/+10
* Replace DTLS w_epoch with epoch from TLSv1.2 record layer.jsing2021-05-055-29/+20
* Rewrite TLSv1.2 key block handling.jsing2021-05-055-134/+247
* Prevent future internal use of some #definestb2021-05-021-1/+3
* Clean up tls1_change_cipher_state().jsing2021-05-025-42/+29
* In the TLSv1.2 server, set up the key block after sending the CCS.jsing2021-05-021-7/+7
* Clean up dtls1_reset_seq_numbers().jsing2021-05-025-26/+22
* Ensure that handshake hash is non-NULL in tls1_transcript_hash_value().jsing2021-05-021-1/+4
* Harden tls12_finished_verify_data() by checking master key length.jsing2021-05-021-1/+4
* Stop deriving peer finished twice for TLSv1.2.jsing2021-05-021-12/+1
* Clean up and harden TLSv1.2 master key derivation.jsing2021-04-305-54/+51
* Clean up derivation of finished/peer finished.jsing2021-04-258-116/+147
* whitespacetb2021-04-231-3/+3
* Only hash known CH extensionstb2021-04-221-5/+5
* Clean up TLSv1.2 certificate request handshake data.jsing2021-04-215-43/+27
* Remove new_sym_enc and new_aead.jsing2021-04-193-10/+19
* Move new_mac_secret_size into the TLSv1.2 handshake struct.jsing2021-04-192-5/+7
* Move reuse_message, message_type, message_size and cert_verify into thejsing2021-04-196-59/+62
* Set alpn_selected_len to zero when freeing alpn_selected.jsing2021-04-191-1/+2
* mention DTLS1_2_VERSIONtb2021-04-151-3/+4
* Mention DTLS1_2_VERSION here, tootb2021-04-151-6/+8
* Document SSL_OP_NO_DTLSv1{,_2}tb2021-04-151-2/+15