summaryrefslogtreecommitdiff
path: root/src/lib (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* The file passed to realpath(3) must exists, adjust man page to newbluhm2019-12-111-3/+3
* Document X509_STORE_CTX_set_flags() which is a handy way to change theclaudio2019-12-051-3/+18
* Add missing RCS tag.tb2019-12-031-0/+1
* Fix typo: ECHD -> ECDH.tb2019-12-031-4/+4
* Add support for TLS 1.3 post handshake messages and key updating.beck2019-11-263-20/+217
* gcc3, like clang and unlike our gcc4, doesn't support redirecting builtinsguenther2019-11-251-6/+12
* A touch of style(9)tim2019-11-211-6/+6
* Use explicit_bzero() to clear key materialtim2019-11-211-1/+2
* Add accessors to change the buffer in a handshake message.beck2019-11-203-3/+20
* Fix rsa key output formatinoguchi2019-11-201-5/+12
* Add prototypes for the functions that update application secretsbeck2019-11-181-1/+3
* Provide a clean interface for sending TLSv1.3 alerts.jsing2019-11-182-5/+17
* Change tls13_record_layer_phh() to take a CBS as this avoids ownershipjsing2019-11-172-8/+6
* Correct update of application traffic secrets to use an empty contextbeck2019-11-171-3/+7
* Bring back the ssl_shutdown internal method pointer.jsing2019-11-173-4/+21
* Add a reference for the non-standard post-handshake handshake (PHH).tb2019-11-171-2/+2
* Ensure that we are never operating in plaintext mode once the handshakejsing2019-11-171-1/+7
* Provide framework for sending alerts and post-handshake handshake messages.jsing2019-11-172-15/+174
* indent with a tab instead of 8 spacestb2019-11-171-2/+2
* Move the TLSv1.3 server message handling stubs.jsing2019-11-172-125/+125
* Add the initial framework for the TLSv1.3 server.jsing2019-11-173-3/+84
* tls13_connect() should be static.jsing2019-11-171-2/+2
* Fix backoff to legacy when in client auth mode.beck2019-11-171-2/+2
* Drop back to the legacy tls method if we are doing client authenticaitonbeck2019-11-171-1/+7
* Separate the callbacks for recieved and completed post handshake messagesbeck2019-11-173-10/+22
* Allow 1.3 ciphers in libtls.beck2019-11-161-2/+2
* Revert previous deduplication diff, I broke portable in a strange way.beck2019-11-161-47/+58
* Allow portable to override the default CA bundle locationbeck2019-11-162-3/+7
* Deduplicate some extension processing code.beck2019-11-151-58/+47
* Add missing cross-reference to NOTES section.millert2019-11-141-3/+3
* Allow ip addresses as argument to SSL_set1_host() but be careful to nototto2019-11-041-2/+14
* Reshuffle RSA_PSS_PARAMS and RSA_OAEP_PARAMS to avoid duplicate typedef.jsing2019-11-041-21/+19
* Sort standard_methods by pkey_id.inoguchi2019-11-021-4/+4
* CMS didn't make the 6.6 release: adjust the text in the HISTORY sectionsschwarze2019-11-0223-69/+69
* .Xr CMS_ContentInfo_new 3schwarze2019-11-021-2/+3
* .Xr BIO_new_CMS 3schwarze2019-11-021-2/+3
* document PEM_read_CMS(3), PEM_read_bio_CMS(3), PEM_write_CMS(3), andschwarze2019-11-021-3/+46
* In Symbols.list rev. 1.91, jsing enabled many CMS functions.schwarze2019-11-021-1/+24
* Bring back some icky buffer allocation code so that pkey_rsa_print()jsing2019-11-021-9/+41
* Bump libcrypto, libssl and libtls minors due to symbol additions.jsing2019-11-023-3/+3
* Provide RSA_PKCS1_OpenSSL().jsing2019-11-023-3/+10
* Make RSA_padding_{add,check}_PKCS1_OAEP_mgf1() public.jsing2019-11-023-9/+10
* Make RSA_OAEP_PARAMs public.jsing2019-11-023-17/+22
* Document tls_conn_cipher_strength().jsing2019-11-021-2/+14
* Enable CMS in LibreSSL.jsing2019-11-023-2/+135
* Provide tls_conn_cipher_strength().jsing2019-11-024-3/+15
* In evp/pmeth_lib.c rev. 1.16, jsing@ enabled EVP_PKEY_RSA_PSS.schwarze2019-11-011-3/+5
* In rsa.h rev. 1.45, jsing@ providedschwarze2019-11-011-8/+16
* Add DSA CMS support.jsing2019-11-011-1/+25
* Add RSA CMS support.jsing2019-11-013-5/+262