summaryrefslogtreecommitdiff
path: root/src/lib (follow)
Commit message (Expand)AuthorAgeFilesLines
* Remove remaining error *_str_functs[]jsing2020-06-054-274/+11
* Apply some style(9).jsing2020-06-051-34/+30
* One error file per directory is plenty.jsing2020-06-053-229/+157
* When X509_ATTRIBUTE_create() receives an invalid NID (e.g., -1), returnschwarze2020-06-042-14/+9
* minor polishing:schwarze2020-06-041-4/+10
* Align tls13_server_select_certificate() withtb2020-06-041-3/+7
* Improve client certificate selection for TLSv1.3tb2020-06-041-16/+80
* mention that TLS_method(3) also supports TLSv1.3;schwarze2020-06-041-3/+3
* Collapse the x509v3 directory into x509.jsing2020-06-0438-47/+44
* new manual page PKCS7_add_attribute(3);schwarze2020-06-047-12/+201
* Properly document PKCS7_final(3), which was already mentionedschwarze2020-06-0310-32/+263
* Remove const modifier in return type of tls13_handshake_active_state()tb2020-06-021-3/+3
* distracting whitespacetb2020-06-021-5/+5
* Split the handling of post handshake handshake messages into itstb2020-06-011-55/+44
* Remove expired certificate, ok tb@sthen2020-06-011-53/+1
* Send an illegal_parameter alert if a client sends us invalid DH keytb2020-06-011-3/+15
* Add a mechanism to set an alert in those parts of the read half oftb2020-06-011-3/+21
* bump to LibreSSL 3.2.1libressl-v3.2.0bcook2020-06-011-3/+3
* Replace ssl_max_server_version() with ssl_downgrade_max_version()jsing2020-05-313-30/+6
* When building a chain look for non-expired certificates first.jsing2020-05-311-8/+29
* Correct downgrade sentinels when a version pinned method is in use.jsing2020-05-314-7/+40
* Improve server certificate selection for TLSv1.3.jsing2020-05-292-23/+94
* Handle the case where we receive a valid 0 byte application data record.jsing2020-05-291-1/+10
* Wire up the servername callback in the TLSv1.3 server.jsing2020-05-293-3/+45
* Mop up servername_done, which is unused.jsing2020-05-293-14/+3
* This patch fixes one bug and one instance of undesirable behaviour.schwarze2020-05-271-9/+1
* document PKCS7_dataFinal(3);schwarze2020-05-273-3/+162
* minor cleanup ahead of the following work:schwarze2020-05-261-12/+14
* Add additional length checks for TLSv1.3 plaintext and inner plaintext.jsing2020-05-261-1/+6
* Fix some stylistic nits from jsing.tb2020-05-241-8/+11
* Clear SSL_MODE_AUTO_RETRY in libtls, since we handle WANT_POLLIN correctly.jsing2020-05-241-1/+3
* Minimally document PKCS7_dataInit(3).schwarze2020-05-244-5/+215
* Briefly mention the obsolete function OPENSSL_init(3).schwarze2020-05-241-7/+23
* Enforce that SNI hostnames be correct as per rfc 6066 and 5980.beck2020-05-232-17/+80
* Enable SSL_MODE_AUTO_RETRY by default.jsing2020-05-231-1/+2
* Wire up SSL_MODE_AUTO_RETRY mode to retrying after PHH messages.jsing2020-05-232-2/+8
* Provide the option to retry or return after post-handshake messages.jsing2020-05-232-4/+16
* fix a confusingly wrapped linetb2020-05-231-3/+3
* Do not assume that server_group != 0 or tlsext_supportedgroups != NULLtb2020-05-232-9/+15
* Ensure we only attach an ocsp staple to a leaf certificate, becausebeck2020-05-222-5/+16
* Simplify: transform a dangling else into an early return andtb2020-05-211-20/+20
* Make ssl_set_cert_masks() more consistent and closer to readable.jsing2020-05-211-44/+27
* Avoid a shadowing issue by renaming cbs and cbb to cbb_hs and cbb_hs,tb2020-05-211-8/+7
* A failure of tls13_handshake_msg_new() could lead to a NULL dereftb2020-05-211-11/+15
* Actually set the hrr flag when sending a HelloRetryRequest.jsing2020-05-211-1/+3
* Revert 1.43 - this fix for PHH in blocking mode breaks SSL_accept andbeck2020-05-201-2/+2
* new manual page for PKCS7_set_content(3) and PKCS7_content_new(3);schwarze2020-05-204-5/+127
* Replace SSL_PKEY_RSA_ENC/SSL_PKEY_RSA_SIGN with SSL_PKEY_RSA.jsing2020-05-198-46/+31
* Only send ocsp staples if the client asked for ocsp certificate status.beck2020-05-191-1/+2
* Add support for TLS 1.3 server to send certificate statusbeck2020-05-195-15/+38