summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Expand)AuthorAgeFilesLines
* Keep sigalg initialiser order consistent - key type, then hash.jsing2021-06-272-20/+20
* Add test coverage for TLSv1.3 client hellos.jsing2021-06-271-13/+166
* Add test coverage for DTLSv1.2 client hellos.jsing2021-06-271-7/+102
* Improve test coverage for SSL_OP_NO_DTLSv1.jsing2021-06-271-1/+9
* Correct handling of SSL_OP_NO_DTLSv1.jsing2021-06-271-3/+3
* Teach hexdump() how to identify differing bytes.jsing2021-06-271-9/+13
* More appropriately set cipher_list_len when AES acceleration is available.jsing2021-06-271-5/+6
* Tweak some data types and sprinkle some const.jsing2021-06-271-15/+15
* Fix .Xr order. From mandoc -Tlint.tb2021-06-262-7/+7
* Garbage collect prototoype for ssl_parse_serverhello_tlsext() whichtb2021-06-231-3/+1
* zap wonky commas;jmc2021-06-221-5/+5
* Clarify tls_config_set_*_file() file I/O semanticskn2021-06-221-13/+11
* Add GnuTLS interoperability test in appstest.shinoguchi2021-06-211-1/+109
* zap trailing whitespacetb2021-06-191-4/+7
* Correctly handle epoch wrapping in dtls1_get_bitmap().jsing2021-06-192-4/+5
* Add DTLS test cases that use non-zero initial epochs.jsing2021-06-192-5/+44
* Provide the ability to set the initial DTLS epoch value.jsing2021-06-194-7/+29
* Initialise the epoch for the DTLS processed and unprocessed queues.jsing2021-06-191-1/+4
* Add more complex DTLS tests for delay/reordering.jsing2021-06-191-17/+160
* Expand comment that details why two DTLS tests currently fail.jsing2021-06-191-2/+5
* Provide the ability to delay/reorder DTLS packets.jsing2021-06-191-14/+147
* Remove SSL_CTX_set_read_ahead() calls - it is now the default for DTLS.jsing2021-06-181-3/+1
* Like ARM, RISC-V does not implement floating point exceptions.kettenis2021-06-173-6/+6
* Mop up part of dtls1_dispatch_alert().jsing2021-06-151-9/+2
* Simplify nonce handling in the TLSv1.2 record layer.jsing2021-06-141-13/+16
* Remove TLS1_AD_INTERNAL_ERROR from internal visibility againtb2021-06-141-3/+1
* Use SSL_AD_INTERNAL_ERRORtb2021-06-141-2/+2
* ugly hack around broken build until people wake up.deraadt2021-06-141-1/+3
* Add SSL_AD_MISSING_EXTENSION.jsing2021-06-132-2/+9
* Define SSL_AD_* as actual values.jsing2021-06-133-42/+49
* Remove tls1_alert_code().jsing2021-06-133-73/+3
* Place obsolete alerts under #ifndef LIBRESSL_INTERNAL.jsing2021-06-131-4/+7
* Remove references to obsolete alerts.jsing2021-06-132-26/+2
* space between macro args and punctuation;jmc2021-06-122-13/+13
* RFC 4507bis can refer to various RFCs but this instance is abouttb2021-06-121-4/+5
* space between RFC and number;jmc2021-06-117-29/+29
* Only use SSL_AD_* internally.jsing2021-06-113-88/+88
* add AES-GCM constants from RFC 7714 for SRTPlandry2021-06-113-4/+20
* sync cert.pem with Mozilla's CA list generated from certdata.txtsthen2021-06-111-476/+163
* SSL3_AD_ILLEGAL_PARAMETER is not a valid SSLerror() reason code.jsing2021-06-111-2/+2
* Indent all labels with a single space.jsing2021-06-1111-44/+44
* Enable libexecinfo regress.mortimer2021-06-091-1/+4
* Simplify tlsext_ecpf_parse()tb2021-06-081-8/+4
* Rewrap a comment to avoid an overlong linetb2021-06-081-3/+3
* Ignore the record version for early alertstb2021-06-081-4/+10
* TLSv1.3 server: avoid sending alerts in legacy recordstb2021-06-081-3/+4
* Adjust alert for ECPF without uncompressed point formattb2021-06-081-3/+4
* Fix pkg-config .pc files with LibreSSLinoguchi2021-06-082-9/+7
* Update RFC reference. RFC 4366 was obsoleted by RFC 6066.tb2021-06-011-2/+2
* Avoid sending a trailing dot in SNI as a clienttb2021-06-011-6/+19