summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Expand)AuthorAgeFilesLines
* Partial port of EC_KEY_METHOD from OpenSSL 1.1.tb2019-01-1916-56/+659
* switch the default algorithm for the dgst command from MD5 to SHA256naddy2019-01-182-6/+6
* Add -iter and -pbkdf2 to the usage synopsis.naddy2019-01-181-15/+17
* initialize offset value so this passesbeck2019-01-181-0/+1
* copyrightbeck2019-01-181-1/+2
* bump copyright years appopriatelybeck2019-01-181-3/+3
* Add client side of supported versions and keyshare extensions with basic regressbeck2019-01-185-5/+454
* Improve the description of locale dependency:schwarze2019-01-182-14/+20
* Replace the vague, incorrect, and confusing BUGS sections with CAVEATSschwarze2019-01-183-12/+33
* tweak previous;jmc2019-01-181-7/+7
* Expose some symbols in a new tls13_handshake.h for regression testing.tb2019-01-183-99/+93
* Removed unused struct members.jsing2019-01-181-2/+0
* Add the -iter and -pbkdf2 argumenst to encbeck2019-01-181-2/+11
* Change the default digest type to sha256, and add support forbeck2019-01-181-5/+44
* Remove this copy, we have decided we can do this in placebeck2019-01-183-1633/+2
* Add support for RFC 8446 section 4.2 enforcing which extensions maybeck2019-01-181-8/+43
* Update regress following TLS extension renaming.jsing2019-01-182-379/+378
* Rename TLS extension handling to use less "hello".jsing2019-01-184-220/+228
* Add regress for extensible buffer code.jsing2019-01-173-1/+169
* Get rid of is_serverhello in preparation for other messagesbeck2019-01-171-13/+24
* Provide an extensible buffer implementation that uses a read callback.jsing2019-01-173-3/+148
* Add support to enforce restrictions on where extensions can appearbeck2019-01-172-12/+38
* Add a direct copy of the exension parsing code to be modified for tls13.beck2019-01-173-2/+1596
* For all functions known to be infected by LC_NUMERIC, add shortschwarze2019-01-162-4/+22
* There are cases where a program doing dns requests wants to set theotto2019-01-141-2/+4
* Move default numer of pools in the multi-threaded case to 8. Various testsotto2019-01-101-2/+2
* Make the "not my pool" searching loop a tiny bit smarter, whileotto2019-01-102-22/+39
* Revert back previous commit and stop including strings.hmestre2019-01-102-9/+7
* Include strings.h for bzero in usr.bin/ncinoguchi2019-01-092-2/+4
* correct article;jmc2019-01-022-6/+6
* too many words in previous;jmc2018-12-271-2/+2
* port ranges can be ambiguous with hypenated port-names.tedu2018-12-272-6/+7
* Make AES CCM available in tables.tb2018-12-261-1/+4
* Make this page much more readable by deleting as much text as possibleschwarze2018-12-241-28/+9
* EVP_MD_CTX_cleanup() is deprecated and doesn't free, so recommend usingtb2018-12-234-12/+12
* Document EVP_PKEY_new_mac_key(3);schwarze2018-12-221-8/+50
* Delete irrelevant HISTORY details. Simply use BN_rand(3); thereschwarze2018-12-221-12/+2
* The wrong header file was given for EVP_PKEY_CTX_set_signature_md(3).schwarze2018-12-211-13/+69
* Document the ECDSA_SIG_new(3) return value.schwarze2018-12-211-2/+10
* Clarify behaviour of DH_get0_pqg(3) and DH_get0_key(3) with NULL arguments;schwarze2018-12-211-4/+19
* grammar and style fixes from wesinator at githubschwarze2018-12-211-13/+14
* Since OpenBSD 6.1, BN_pseudo_rand*(3) does the same as BN_rand*(3).schwarze2018-12-211-10/+18
* Mention that some functions call BN_GENCB_call(3) with a secondschwarze2018-12-211-4/+15
* Correctly describe the return values of BN_hex2bn(3) and BN_dec2bn(3).schwarze2018-12-191-5/+8
* Specify the return values of some of these functions more precisely;schwarze2018-12-191-15/+16
* typo;schwarze2018-12-191-4/+5
* Add regress test for bugs in stdio/fread.c rev 1.13 and 1.17millert2018-12-163-2/+160
* Regenerate root CA list using updated format-pem.pl. Specifically thissthen2018-12-161-101/+1
* Add a check that libressl is actually able to verify CA certs.sthen2018-12-161-12/+28
* add a -R option to set/unset resolver flags.libressl-v2.9.0eric2018-12-159-20/+101