summaryrefslogtreecommitdiff
path: root/src/lib (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Use EXFLAG_INVALID to handle out of memory and parse errors intobhe2021-03-132-11/+45
* Zap a useless variable.tb2021-03-121-4/+2
* Missing void in function definitiontb2021-03-121-2/+2
* Fix checks of memory caps of constraints namestb2021-03-123-20/+32
* spelling: refenece -> referencejmc2021-03-121-3/+3
* spellingjsg2021-03-1212-37/+37
* Remove ssl_downgrade_max_version().jsing2021-03-115-54/+15
* Guard TLS1_get_{client_,}version() macros with #ifndef LIBRESSL_INTERNAL.jsing2021-03-101-1/+3
* Improve internal version handling.jsing2021-03-109-108/+145
* Change the implementation of the malloc cache to keep lists ofotto2021-03-091-152/+118
* LibreSSL 3.3.2bcook2021-03-071-3/+3
* Separate variable declaration and assignment.jsing2021-03-021-2/+4
* Replace two handrolled tls12_record_protection_engaged().jsing2021-03-021-3/+3
* Move key/IV length checks closer to usage sites.jsing2021-03-021-5/+11
* Add tls12_record_protection_unused() and call from CCS functions.jsing2021-03-021-8/+17
* Fix misleading indentation in SSL_get_error()tb2021-03-021-2/+2
* Move handling of cipher/hash based cipher suites into the new record layer.jsing2021-02-275-200/+141
* Identify DTLS based on the version major value.jsing2021-02-271-2/+2
* Set is_trusted in x509_verify_ctx_add_chain()tb2021-02-261-2/+2
* Fix two bugs in the legacy verifiertb2021-02-251-6/+10
* Only use TLS versions internally (rather than both TLS and DTLS versions).jsing2021-02-259-128/+132
* Rename depth to num_untrusted so it identifies what it actually represents.jsing2021-02-251-6/+6
* Avoid passing last and depth to x509_verify_cert_error() on ENOMEM.jsing2021-02-251-3/+2
* - Make use of the fact that we know how the chunks are aligned, andotto2021-02-252-49/+83
* Fix comment explaining last_untrusted. This should really be calledtb2021-02-241-2/+2
* Make the new validator check for EXFLAG_CRITICALtb2021-02-241-8/+15
* Fix bizarre punctuation and capitalization in a comment.tb2021-02-221-2/+2
* Simplify version checks in the TLSv1.3 clienttb2021-02-221-22/+10
* Factor out/change some of the legacy client version handling code.jsing2021-02-223-12/+36
* ugly whitespacetb2021-02-202-14/+14
* Rename f_err into fatal_err.tb2021-02-207-183/+183
* Rename the truncated label into decode_err. This describes its purposetb2021-02-202-73/+73
* Return a min/max version of zero if set to zero.jsing2021-02-203-17/+41
* Add DTLSv1.2 methods.jsing2021-02-202-3/+159
* Handle DTLS1_2_VERSION in various places.jsing2021-02-203-6/+9
* Revise HelloVerifyRequest handling for DTLSv1.2.jsing2021-02-202-4/+14
* Group HelloVerifyRequest decoding and add missing check for trailing data.jsing2021-02-201-4/+5
* Add various public DTLS related defines.jsing2021-02-202-2/+14
* Clean up/simplify dtls1_get_cipher().jsing2021-02-201-7/+8
* Pull in fix for EVP_CipherUpdate() overflow from OpenSSL.tb2021-02-181-1/+23
* Some people still argue that rand(3) and random(3) have suitable deterministicderaadt2021-02-122-4/+10
* Sync cert.pem with Mozilla NSS root CAs, except "GeoTrust Global CA", ok tb@sthen2021-02-121-659/+417
* KNFtb2021-02-111-4/+7
* Remove bogus DTLS checks to disable ECC and OCSP.jsing2021-02-082-10/+3
* Enforce read ahead with DTLS.jsing2021-02-081-5/+5
* Use dtls1_retrieve_buffered_record() to load buffered application data.jsing2021-02-081-11/+3
* Absorb ssl3_get_algorithm2() into ssl_get_handshake_evp_md().jsing2021-02-074-22/+19
* Correct handshake MAC/PRF for various TLSv1.2 cipher suites.jsing2021-02-071-8/+8
* Factor out the legacy stack version checks.jsing2021-02-074-28/+24
* Fail early in legacy exporter if master secret is not availabletb2021-02-031-1/+6