index
:
openbsd
OPENBSD_2_0
OPENBSD_2_1
OPENBSD_2_2
OPENBSD_2_3
OPENBSD_2_4
OPENBSD_2_5
OPENBSD_2_6
OPENBSD_2_7
OPENBSD_2_8
OPENBSD_2_9
OPENBSD_3_0
OPENBSD_3_1
OPENBSD_3_2
OPENBSD_3_3
OPENBSD_3_4
OPENBSD_3_5
OPENBSD_3_6
OPENBSD_3_7
OPENBSD_3_8
OPENBSD_3_9
OPENBSD_4_0
OPENBSD_4_1
OPENBSD_4_2
OPENBSD_4_3
OPENBSD_4_4
OPENBSD_4_5
OPENBSD_4_6
OPENBSD_4_7
OPENBSD_4_8
OPENBSD_4_9
OPENBSD_5_0
OPENBSD_5_1
OPENBSD_5_2
OPENBSD_5_3
OPENBSD_5_4
OPENBSD_5_5
OPENBSD_5_6
OPENBSD_5_7
OPENBSD_5_8
OPENBSD_5_9
OPENBSD_6_0
OPENBSD_6_1
OPENBSD_6_2
OPENBSD_6_3
OPENBSD_6_4
OPENBSD_6_5
OPENBSD_6_6
OPENBSD_6_7
OPENBSD_6_8
OPENBSD_6_9
OPENBSD_7_0
OPENBSD_7_1
OPENBSD_7_2
OPENBSD_7_3
OPENBSD_7_4
OPENBSD_7_5
OPENBSD_7_6
master
A mirror of https://github.com/libressl/openbsd.git
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
src
(
follow
)
Commit message (
Expand
)
Author
Age
Files
Lines
*
Move unsupported, obsolete ciphers and deprecated aliases out of
schwarze
2020-04-25
1
-31
/
+29
*
tweak the wording to make it clearer under which conditions exactly
schwarze
2020-04-25
1
-4
/
+4
*
Revise regress to match state transition changes.
jsing
2020-04-22
1
-11
/
+13
*
Improve TLSv1.3 state machine for HelloRetryRequest handling.
jsing
2020-04-22
5
-66
/
+104
*
Handle TLSv1.3 key shares other than X25519 on the server side.
jsing
2020-04-21
2
-16
/
+34
*
Consolidate TLSv1.3 constants.
jsing
2020-04-21
3
-40
/
+47
*
Add -groups option to openssl(1) s_server.
jsing
2020-04-19
2
-35
/
+31
*
Provide TLSv1.3 cipher suite aliases to match the names used in RFC 8446.
jsing
2020-04-19
1
-2
/
+25
*
Fix wrapping/indentation.
jsing
2020-04-18
1
-4
/
+3
*
Expose the peer ephemeral public key used for TLSv1.3 key exchange.
jsing
2020-04-18
5
-36
/
+79
*
Tweak previous active cipher suite code.
jsing
2020-04-18
1
-6
/
+5
*
Allow more key share groups for TLSv1.3.
jsing
2020-04-18
1
-21
/
+12
*
Only include TLSv1.3 cipher suites if there are active cipher suites.
jsing
2020-04-17
1
-2
/
+10
*
Update key share regress to match previous change.
jsing
2020-04-17
1
-4
/
+4
*
Generate client key share using our preferred group.
jsing
2020-04-17
4
-25
/
+37
*
Remove AUTHORS section. This follows what is done in strstr.3
claudio
2020-04-16
1
-4
/
+2
*
Replace the simple memmem() implementation with a version that is O(n)
claudio
2020-04-16
1
-47
/
+167
*
Resync our strstr.c with the musl version. Removes some debug code and
claudio
2020-04-16
1
-11
/
+3
*
Update in several respects:
schwarze
2020-04-14
1
-13
/
+11
*
add the missing sentence "LibreSSL no longer provides any such
schwarze
2020-04-14
1
-2
/
+3
*
Delete the three sentences listing the ciphers currently included
schwarze
2020-04-14
1
-15
/
+2
*
Document the TLSv1.3 control word, update the description of the
schwarze
2020-04-11
1
-4
/
+30
*
sync cert.pem with Mozilla's root ca list, ok beck@
sthen
2020-04-10
1
-276
/
+343
*
When printing the serialNumber, fall back to the colon separated hex
tb
2020-04-10
1
-2
/
+4
*
Revise test to handle the fact that TLSv1.3 cipher suites are now being
jsing
2020-04-09
1
-2
/
+4
*
Include TLSv1.3 cipher suites unless cipher string references TLSv1.3.
jsing
2020-04-09
1
-6
/
+19
*
Test both SSLv3 (aka pre-TLSv1.2) and TLSv1.2 cipher suites with TLS.
jsing
2020-04-09
1
-1
/
+1
*
Tidy line wrapping and remove an extra blank line.
jsing
2020-04-09
1
-4
/
+3
*
ssl_aes_is_accelerated() returns a boolean - treat it as such, rather than
jsing
2020-04-09
1
-2
/
+2
*
Ensure legacy session ID is persistent during client TLS session.
jsing
2020-04-08
1
-9
/
+14
*
Re-enable the client test now that it passes again.
jsing
2020-04-06
1
-2
/
+2
*
Minor code improvements.
jsing
2020-04-06
1
-3
/
+3
*
Add tests that cover TLSv1.2 and disable those that trigger TLSv1.3.
jsing
2020-04-06
1
-3
/
+32
*
Zero the client random field in the TLSv1.2 golden value.
jsing
2020-04-06
1
-5
/
+5
*
Improve comparision with test data.
jsing
2020-04-06
1
-7
/
+9
*
Dump the test data when the lengths differ in order to aid debugging.
jsing
2020-04-06
1
-0
/
+3
*
Use errx() if we fail to build the client hello.
jsing
2020-04-06
1
-1
/
+1
*
Send a zero-length session identifier if TLSv1.3 is not enabled.
jsing
2020-04-06
1
-4
/
+7
*
"eventually" came and went back in 2004.
libressl-v3.1.0
martijn
2020-03-30
1
-3
/
+1
*
Void functions obviously do not return values; no need to elaborate.
schwarze
2020-03-30
5
-31
/
+10
*
Void functions obviously do not return values; no need to elaborate.
schwarze
2020-03-29
5
-28
/
+10
*
Be concise: do not say that void functions return no values, that's obvious.
schwarze
2020-03-28
3
-22
/
+6
*
Fix ASN1 print functions
inoguchi
2020-03-24
1
-6
/
+13
*
Add a test program for getopt(3) that is adequate for manual testing
schwarze
2020-03-23
4
-2
/
+174
*
Consistently spell 'unsigned' as 'unsigned int', as style(9) seems
tb
2020-03-16
7
-44
/
+45
*
Adapt to tls13_record_layer.c r1.30 (the sequence number shouldn't wrap).
tb
2020-03-16
1
-2
/
+2
*
The RFC is clear (section 5.3) that sequence number should never wrap.
tb
2020-03-16
1
-5
/
+12
*
Increment a few more sequence numbers where the carry is close to
tb
2020-03-13
1
-1
/
+41
*
Remove dtls1_enc().
jsing
2020-03-13
5
-222
/
+11
*
Add regress for TLSv1.3 sequence number handling.
jsing
2020-03-13
3
-1
/
+135
[next]