summaryrefslogtreecommitdiff
path: root/src/lib (follow)
Commit message (Expand)AuthorAgeFilesLines
* Avoid a use-after-scope in tls13_cert_add().jsing2021-03-211-4/+3
* Prepare documenting SSL_use_certificate_chain_filetb2021-03-191-2/+19
* Undo previous. As pointed out by jsing I clearly wasn't fully awake...tb2021-03-191-2/+2
* Prepare to provide SSL_use_certificate_chain_file()tb2021-03-192-15/+40
* Fix copy-paste error in previoustb2021-03-191-2/+2
* Type-cast getpagesize() from int to size_t for the comparison with d.claudio2021-03-181-2/+2
* fix whitespace nit in previoustb2021-03-171-2/+2
* Enable DTLSv1.2.jsing2021-03-171-1/+5
* Add support for DTLSv1.2 version handling.jsing2021-03-171-45/+117
* Use EXFLAG_INVALID to handle out of memory and parse errors intobhe2021-03-132-11/+45
* Zap a useless variable.tb2021-03-121-4/+2
* Missing void in function definitiontb2021-03-121-2/+2
* Fix checks of memory caps of constraints namestb2021-03-123-20/+32
* spelling: refenece -> referencejmc2021-03-121-3/+3
* spellingjsg2021-03-1212-37/+37
* Remove ssl_downgrade_max_version().jsing2021-03-115-54/+15
* Guard TLS1_get_{client_,}version() macros with #ifndef LIBRESSL_INTERNAL.jsing2021-03-101-1/+3
* Improve internal version handling.jsing2021-03-109-108/+145
* Change the implementation of the malloc cache to keep lists ofotto2021-03-091-152/+118
* LibreSSL 3.3.2bcook2021-03-071-3/+3
* Separate variable declaration and assignment.jsing2021-03-021-2/+4
* Replace two handrolled tls12_record_protection_engaged().jsing2021-03-021-3/+3
* Move key/IV length checks closer to usage sites.jsing2021-03-021-5/+11
* Add tls12_record_protection_unused() and call from CCS functions.jsing2021-03-021-8/+17
* Fix misleading indentation in SSL_get_error()tb2021-03-021-2/+2
* Move handling of cipher/hash based cipher suites into the new record layer.jsing2021-02-275-200/+141
* Identify DTLS based on the version major value.jsing2021-02-271-2/+2
* Set is_trusted in x509_verify_ctx_add_chain()tb2021-02-261-2/+2
* Fix two bugs in the legacy verifiertb2021-02-251-6/+10
* Only use TLS versions internally (rather than both TLS and DTLS versions).jsing2021-02-259-128/+132
* Rename depth to num_untrusted so it identifies what it actually represents.jsing2021-02-251-6/+6
* Avoid passing last and depth to x509_verify_cert_error() on ENOMEM.jsing2021-02-251-3/+2
* - Make use of the fact that we know how the chunks are aligned, andotto2021-02-252-49/+83
* Fix comment explaining last_untrusted. This should really be calledtb2021-02-241-2/+2
* Make the new validator check for EXFLAG_CRITICALtb2021-02-241-8/+15
* Fix bizarre punctuation and capitalization in a comment.tb2021-02-221-2/+2
* Simplify version checks in the TLSv1.3 clienttb2021-02-221-22/+10
* Factor out/change some of the legacy client version handling code.jsing2021-02-223-12/+36
* ugly whitespacetb2021-02-202-14/+14
* Rename f_err into fatal_err.tb2021-02-207-183/+183
* Rename the truncated label into decode_err. This describes its purposetb2021-02-202-73/+73
* Return a min/max version of zero if set to zero.jsing2021-02-203-17/+41
* Add DTLSv1.2 methods.jsing2021-02-202-3/+159
* Handle DTLS1_2_VERSION in various places.jsing2021-02-203-6/+9
* Revise HelloVerifyRequest handling for DTLSv1.2.jsing2021-02-202-4/+14
* Group HelloVerifyRequest decoding and add missing check for trailing data.jsing2021-02-201-4/+5
* Add various public DTLS related defines.jsing2021-02-202-2/+14
* Clean up/simplify dtls1_get_cipher().jsing2021-02-201-7/+8
* Pull in fix for EVP_CipherUpdate() overflow from OpenSSL.tb2021-02-181-1/+23
* Some people still argue that rand(3) and random(3) have suitable deterministicderaadt2021-02-122-4/+10