summaryrefslogtreecommitdiff
path: root/src (unfollow)
Commit message (Expand)AuthorFilesLines
2020-06-11wording tweaks from ross l richardson and tb;jmc1-6/+6
2020-06-10Add lucky13 and bleichenbacher-timing teststb1-1/+7
2020-06-10document PKCS7_get_signer_info(3)schwarze5-8/+75
2020-06-10describe six more PKCS7 attribute functionsschwarze1-14/+208
2020-06-09The check_includes step is incorrect dependency management model forderaadt3-33/+3
2020-06-06Implement a rolling hash of the ClientHello message, Enforce RFC 8446beck7-9/+181
2020-06-05Add a custom copy handler for AES key wraptb1-5/+31
2020-06-05Use IANA allocated GOST ClientCertificateTypes.jsing3-9/+15
2020-06-05Stop sending GOST R 34.10-94 as a CertificateType.jsing1-3/+1
2020-06-05Handle GOST in ssl_cert_dup().jsing1-1/+5
2020-06-05Enable GOST_SIG_FORMAT_RS_LE when verifying certificate signatures.jsing2-2/+15
2020-06-05Allow GOST R 34.11-2012 in PBE/PBKDF2/PKCS#5.jsing1-1/+3
2020-06-05Add OIDs for HMAC using Streebog (GOST R 34.11-2012) hash function.jsing2-0/+4
2020-06-05Add a few more errors to help debugging.jsing1-6/+16
2020-06-05Add support for additional GOST curves.jsing4-12/+182
2020-06-05Remove remaining error *_str_functs[]jsing4-274/+11
2020-06-05Apply some style(9).jsing1-34/+30
2020-06-05One error file per directory is plenty.jsing3-229/+157
2020-06-04When X509_ATTRIBUTE_create() receives an invalid NID (e.g., -1), returnschwarze4-19/+124
2020-06-04minor polishing:schwarze1-4/+10
2020-06-04Align tls13_server_select_certificate() withtb1-3/+7
2020-06-04Improve client certificate selection for TLSv1.3tb1-16/+80
2020-06-04mention that TLS_method(3) also supports TLSv1.3;schwarze1-3/+3
2020-06-04Collapse the x509v3 directory into x509.jsing38-47/+44
2020-06-04new manual page PKCS7_add_attribute(3);schwarze7-12/+201
2020-06-03Properly document PKCS7_final(3), which was already mentionedschwarze10-32/+263
2020-06-03Enable the record layer limits test and mark two finished test cases astb1-5/+8
2020-06-02Remove const modifier in return type of tls13_handshake_active_state()tb1-3/+3
2020-06-02distracting whitespacetb1-5/+5
2020-06-01Split the handling of post handshake handshake messages into itstb1-55/+44
2020-06-01Remove expired certificate, ok tb@sthen1-53/+1
2020-06-01Enable the test-tls13-zero-length-data.py test, skipping thetb1-8/+10
2020-06-01Enable test-dhe-rsa-key-exchange-with-bad-messages.pytb1-4/+2
2020-06-01Send an illegal_parameter alert if a client sends us invalid DH keytb1-3/+15
2020-06-01Add a mechanism to set an alert in those parts of the read half oftb1-3/+21
2020-06-01bump to LibreSSL 3.2.1libressl-v3.2.0bcook1-3/+3
2020-05-31Replace ssl_max_server_version() with ssl_downgrade_max_version()jsing3-30/+6
2020-05-31When building a chain look for non-expired certificates first.jsing1-8/+29
2020-05-31Correct downgrade sentinels when a version pinned method is in use.jsing4-7/+40
2020-05-31Fix printing long doubles on architectures with hm and lm bits.mortimer1-1/+9
2020-05-29Improve server certificate selection for TLSv1.3.jsing2-23/+94
2020-05-29Handle the case where we receive a valid 0 byte application data record.jsing1-1/+10
2020-05-29Wire up the servername callback in the TLSv1.3 server.jsing3-3/+45
2020-05-29Mop up servername_done, which is unused.jsing3-14/+3
2020-05-29Add checks for SH downgrade sentinel and HRR hash in appstest.shinoguchi1-1/+27
2020-05-27more tests after getopt_long.c rev. 1.32;schwarze1-10/+43
2020-05-27This patch fixes one bug and one instance of undesirable behaviour.schwarze1-9/+1
2020-05-27document PKCS7_dataFinal(3);schwarze3-3/+162
2020-05-26minor cleanup ahead of the following work:schwarze1-12/+14
2020-05-26Add additional length checks for TLSv1.3 plaintext and inner plaintext.jsing1-1/+6