summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Add SSL_HANDSHAKE_TLS12 for TLSv1.2 specific handshake data.jsing2021-03-245-40/+48
* Convert openssl(1) x509 option handlinginoguchi2021-03-241-414/+747
* Add option type OPTION_ORDERinoguchi2021-03-242-2/+9
* OCSP_basic_verify() doesn't set errno, so use tls_set_errorx()tb2021-03-231-2/+2
* Don't leak ca in test_cms_sign_verify().tb2021-03-221-1/+2
* Plug a few memory leaks reported by Ilya Shipitsintb2021-03-221-9/+7
* Fully initialize rrec in tls12_record_layer_open_record_protectedtb2021-03-211-1/+2
* Revise regress to match handshake struct changes.jsing2021-03-211-18/+18
* Move the TLSv1.3 handshake struct inside the shared handshake struct.jsing2021-03-219-226/+227
* Split TLSv1.3 record protection from record layer.jsing2021-03-211-46/+72
* Build options regress with -DLIBRESSL_INTERNAL.jsing2021-03-211-2/+2
* Avoid a use-after-scope in tls13_cert_add().jsing2021-03-211-4/+3
* Plug memory leak reported by Ilya Shipitsintb2021-03-211-3/+2
* typotb2021-03-201-2/+2
* Add new test-tls13-multiple-ccs-messages.pytb2021-03-201-1/+8
* Prepare documenting SSL_use_certificate_chain_filetb2021-03-191-2/+19
* Undo previous. As pointed out by jsing I clearly wasn't fully awake...tb2021-03-191-2/+2
* Prepare to provide SSL_use_certificate_chain_file()tb2021-03-192-15/+40
* Fix copy-paste error in previoustb2021-03-191-2/+2
* Type-cast getpagesize() from int to size_t for the comparison with d.claudio2021-03-181-2/+2
* Read ahead is now enforced for DTLS - remove workarounds.jsing2021-03-172-20/+2
* Use consistent s_server_opt_ prefix.jsing2021-03-171-9/+9
* Add DTLSv1.2 support to openssl(1) s_client/s_server.jsing2021-03-174-34/+129
* fix whitespace nit in previoustb2021-03-171-2/+2
* Update for DTLSv1.2 being enabled.jsing2021-03-171-4/+4
* Enable DTLSv1.2.jsing2021-03-171-1/+5
* Update for DTLSv1.2 version handling.jsing2021-03-171-6/+90
* Add support for DTLSv1.2 version handling.jsing2021-03-171-45/+117
* Use EXFLAG_INVALID to handle out of memory and parse errors intobhe2021-03-132-11/+45
* Zap a useless variable.tb2021-03-121-4/+2
* Missing void in function definitiontb2021-03-121-2/+2
* Fix checks of memory caps of constraints namestb2021-03-123-20/+32
* spelling: refenece -> referencejmc2021-03-121-3/+3
* spellingjsg2021-03-1212-37/+37
* Remove ssl_downgrade_max_version().jsing2021-03-115-54/+15
* Check for the existence of p5-IO-Socket-SSL by checking for its SSL.pmtb2021-03-111-3/+4
* Guard TLS1_get_{client_,}version() macros with #ifndef LIBRESSL_INTERNAL.jsing2021-03-101-1/+3
* Revise TLS extension regress to match version handling changes.jsing2021-03-101-57/+25
* Improve internal version handling.jsing2021-03-109-108/+145
* Change the implementation of the malloc cache to keep lists ofotto2021-03-091-152/+118
* LibreSSL 3.3.2bcook2021-03-071-3/+3
* Separate variable declaration and assignment.jsing2021-03-021-2/+4
* Replace two handrolled tls12_record_protection_engaged().jsing2021-03-021-3/+3
* Move key/IV length checks closer to usage sites.jsing2021-03-021-5/+11
* Add tls12_record_protection_unused() and call from CCS functions.jsing2021-03-021-8/+17
* Fix misleading indentation in SSL_get_error()tb2021-03-021-2/+2
* Move handling of cipher/hash based cipher suites into the new record layer.jsing2021-02-275-200/+141
* Identify DTLS based on the version major value.jsing2021-02-271-2/+2
* Set is_trusted in x509_verify_ctx_add_chain()tb2021-02-261-2/+2
* zap spades of trailing whitespacetb2021-02-261-266/+266