summaryrefslogtreecommitdiff
path: root/src/lib (follow)
Commit message (Expand)AuthorAgeFilesLines
* The state machine now takes care of setting the legacy state,tb2021-06-281-11/+1
* Expand info callback support for TLSv1.3tb2021-06-282-7/+187
* Track the sigalgs used by ourselves and our peer.jsing2021-06-273-9/+14
* Have ssl3_send_client_verify() pass *pkey to called functions.jsing2021-06-271-22/+11
* Change ssl_sigalgs_from_value() to perform sigalg list selection.jsing2021-06-276-32/+31
* Rename ssl_sigalg() to ssl_sigalg_from_value().jsing2021-06-276-17/+18
* Change ssl_sigalgs_build() to perform sigalg list selection.jsing2021-06-274-28/+29
* Tidy some comments and simplify some code.jsing2021-06-271-15/+7
* Keep sigalg initialiser order consistent - key type, then hash.jsing2021-06-272-20/+20
* Correct handling of SSL_OP_NO_DTLSv1.jsing2021-06-271-3/+3
* Fix .Xr order. From mandoc -Tlint.tb2021-06-262-7/+7
* Garbage collect prototoype for ssl_parse_serverhello_tlsext() whichtb2021-06-231-3/+1
* zap wonky commas;jmc2021-06-221-5/+5
* Clarify tls_config_set_*_file() file I/O semanticskn2021-06-221-13/+11
* Correctly handle epoch wrapping in dtls1_get_bitmap().jsing2021-06-192-4/+5
* Provide the ability to set the initial DTLS epoch value.jsing2021-06-194-7/+29
* Initialise the epoch for the DTLS processed and unprocessed queues.jsing2021-06-191-1/+4
* Mop up part of dtls1_dispatch_alert().jsing2021-06-151-9/+2
* Simplify nonce handling in the TLSv1.2 record layer.jsing2021-06-141-13/+16
* Remove TLS1_AD_INTERNAL_ERROR from internal visibility againtb2021-06-141-3/+1
* Use SSL_AD_INTERNAL_ERRORtb2021-06-141-2/+2
* ugly hack around broken build until people wake up.deraadt2021-06-141-1/+3
* Add SSL_AD_MISSING_EXTENSION.jsing2021-06-132-2/+9
* Define SSL_AD_* as actual values.jsing2021-06-133-42/+49
* Remove tls1_alert_code().jsing2021-06-133-73/+3
* Place obsolete alerts under #ifndef LIBRESSL_INTERNAL.jsing2021-06-131-4/+7
* Remove references to obsolete alerts.jsing2021-06-132-26/+2
* space between macro args and punctuation;jmc2021-06-122-13/+13
* RFC 4507bis can refer to various RFCs but this instance is abouttb2021-06-121-4/+5
* space between RFC and number;jmc2021-06-117-29/+29
* Only use SSL_AD_* internally.jsing2021-06-113-88/+88
* add AES-GCM constants from RFC 7714 for SRTPlandry2021-06-113-4/+20
* sync cert.pem with Mozilla's CA list generated from certdata.txtsthen2021-06-111-476/+163
* SSL3_AD_ILLEGAL_PARAMETER is not a valid SSLerror() reason code.jsing2021-06-111-2/+2
* Indent all labels with a single space.jsing2021-06-1111-44/+44
* Simplify tlsext_ecpf_parse()tb2021-06-081-8/+4
* Rewrap a comment to avoid an overlong linetb2021-06-081-3/+3
* Ignore the record version for early alertstb2021-06-081-4/+10
* TLSv1.3 server: avoid sending alerts in legacy recordstb2021-06-081-3/+4
* Adjust alert for ECPF without uncompressed point formattb2021-06-081-3/+4
* Fix pkg-config .pc files with LibreSSLinoguchi2021-06-082-9/+7
* Update RFC reference. RFC 4366 was obsoleted by RFC 6066.tb2021-06-011-2/+2
* Avoid sending a trailing dot in SNI as a clienttb2021-06-011-6/+19
* Remove unnecessary cast in free.tb2021-06-011-2/+2
* EVP_Digest*: fix documented return values.tb2021-05-202-10/+6
* Adjust libcrypto obj_xref.txt to obj_xref.hinoguchi2021-05-191-2/+2
* Absorb SSL_AEAD_CTX into struct tls12_record_protection.jsing2021-05-163-73/+63
* Zero the tls12_record_protection struct instead of individual fields.jsing2021-05-161-9/+3
* Avoid including tls13_internal.h in tls13_record.h.jsing2021-05-161-2/+1
* Avoid pulling ssl_locl.h into self-contained code.jsing2021-05-164-8/+4