summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Expand)AuthorAgeFilesLines
* typotb2021-03-201-2/+2
* Add new test-tls13-multiple-ccs-messages.pytb2021-03-201-1/+8
* Prepare documenting SSL_use_certificate_chain_filetb2021-03-191-2/+19
* Undo previous. As pointed out by jsing I clearly wasn't fully awake...tb2021-03-191-2/+2
* Prepare to provide SSL_use_certificate_chain_file()tb2021-03-192-15/+40
* Fix copy-paste error in previoustb2021-03-191-2/+2
* Type-cast getpagesize() from int to size_t for the comparison with d.claudio2021-03-181-2/+2
* Read ahead is now enforced for DTLS - remove workarounds.jsing2021-03-172-20/+2
* Use consistent s_server_opt_ prefix.jsing2021-03-171-9/+9
* Add DTLSv1.2 support to openssl(1) s_client/s_server.jsing2021-03-174-34/+129
* fix whitespace nit in previoustb2021-03-171-2/+2
* Update for DTLSv1.2 being enabled.jsing2021-03-171-4/+4
* Enable DTLSv1.2.jsing2021-03-171-1/+5
* Update for DTLSv1.2 version handling.jsing2021-03-171-6/+90
* Add support for DTLSv1.2 version handling.jsing2021-03-171-45/+117
* Use EXFLAG_INVALID to handle out of memory and parse errors intobhe2021-03-132-11/+45
* Zap a useless variable.tb2021-03-121-4/+2
* Missing void in function definitiontb2021-03-121-2/+2
* Fix checks of memory caps of constraints namestb2021-03-123-20/+32
* spelling: refenece -> referencejmc2021-03-121-3/+3
* spellingjsg2021-03-1212-37/+37
* Remove ssl_downgrade_max_version().jsing2021-03-115-54/+15
* Check for the existence of p5-IO-Socket-SSL by checking for its SSL.pmtb2021-03-111-3/+4
* Guard TLS1_get_{client_,}version() macros with #ifndef LIBRESSL_INTERNAL.jsing2021-03-101-1/+3
* Revise TLS extension regress to match version handling changes.jsing2021-03-101-57/+25
* Improve internal version handling.jsing2021-03-109-108/+145
* Change the implementation of the malloc cache to keep lists ofotto2021-03-091-152/+118
* LibreSSL 3.3.2bcook2021-03-071-3/+3
* Separate variable declaration and assignment.jsing2021-03-021-2/+4
* Replace two handrolled tls12_record_protection_engaged().jsing2021-03-021-3/+3
* Move key/IV length checks closer to usage sites.jsing2021-03-021-5/+11
* Add tls12_record_protection_unused() and call from CCS functions.jsing2021-03-021-8/+17
* Fix misleading indentation in SSL_get_error()tb2021-03-021-2/+2
* Move handling of cipher/hash based cipher suites into the new record layer.jsing2021-02-275-200/+141
* Identify DTLS based on the version major value.jsing2021-02-271-2/+2
* Set is_trusted in x509_verify_ctx_add_chain()tb2021-02-261-2/+2
* zap spades of trailing whitespacetb2021-02-261-266/+266
* Fix two bugs in the legacy verifiertb2021-02-251-6/+10
* Update regress to match TLS versions change.jsing2021-02-251-6/+6
* Only use TLS versions internally (rather than both TLS and DTLS versions).jsing2021-02-259-128/+132
* Rename depth to num_untrusted so it identifies what it actually represents.jsing2021-02-251-6/+6
* Avoid passing last and depth to x509_verify_cert_error() on ENOMEM.jsing2021-02-251-3/+2
* - Make use of the fact that we know how the chunks are aligned, andotto2021-02-252-49/+83
* Fix comment explaining last_untrusted. This should really be calledtb2021-02-241-2/+2
* Make the new validator check for EXFLAG_CRITICALtb2021-02-241-8/+15
* Make this test module aware so it passes with Go 1.16tb2021-02-232-0/+8
* Fix bizarre punctuation and capitalization in a comment.tb2021-02-221-2/+2
* Simplify version checks in the TLSv1.3 clienttb2021-02-221-22/+10
* Factor out/change some of the legacy client version handling code.jsing2021-02-223-12/+36
* ugly whitespacetb2021-02-202-14/+14