summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Expand)AuthorAgeFilesLines
* Add a few more errors to help debugging.jsing2020-06-051-6/+16
* Add support for additional GOST curves.jsing2020-06-054-12/+182
* Remove remaining error *_str_functs[]jsing2020-06-054-274/+11
* Apply some style(9).jsing2020-06-051-34/+30
* One error file per directory is plenty.jsing2020-06-053-229/+157
* When X509_ATTRIBUTE_create() receives an invalid NID (e.g., -1), returnschwarze2020-06-044-19/+124
* minor polishing:schwarze2020-06-041-4/+10
* Align tls13_server_select_certificate() withtb2020-06-041-3/+7
* Improve client certificate selection for TLSv1.3tb2020-06-041-16/+80
* mention that TLS_method(3) also supports TLSv1.3;schwarze2020-06-041-3/+3
* Collapse the x509v3 directory into x509.jsing2020-06-0438-47/+44
* new manual page PKCS7_add_attribute(3);schwarze2020-06-047-12/+201
* Properly document PKCS7_final(3), which was already mentionedschwarze2020-06-0310-32/+263
* Enable the record layer limits test and mark two finished test cases astb2020-06-031-5/+8
* Remove const modifier in return type of tls13_handshake_active_state()tb2020-06-021-3/+3
* distracting whitespacetb2020-06-021-5/+5
* Split the handling of post handshake handshake messages into itstb2020-06-011-55/+44
* Remove expired certificate, ok tb@sthen2020-06-011-53/+1
* Enable the test-tls13-zero-length-data.py test, skipping thetb2020-06-011-8/+10
* Enable test-dhe-rsa-key-exchange-with-bad-messages.pytb2020-06-011-4/+2
* Send an illegal_parameter alert if a client sends us invalid DH keytb2020-06-011-3/+15
* Add a mechanism to set an alert in those parts of the read half oftb2020-06-011-3/+21
* bump to LibreSSL 3.2.1libressl-v3.2.0bcook2020-06-011-3/+3
* Replace ssl_max_server_version() with ssl_downgrade_max_version()jsing2020-05-313-30/+6
* When building a chain look for non-expired certificates first.jsing2020-05-311-8/+29
* Correct downgrade sentinels when a version pinned method is in use.jsing2020-05-314-7/+40
* Fix printing long doubles on architectures with hm and lm bits.mortimer2020-05-311-1/+9
* Improve server certificate selection for TLSv1.3.jsing2020-05-292-23/+94
* Handle the case where we receive a valid 0 byte application data record.jsing2020-05-291-1/+10
* Wire up the servername callback in the TLSv1.3 server.jsing2020-05-293-3/+45
* Mop up servername_done, which is unused.jsing2020-05-293-14/+3
* Add checks for SH downgrade sentinel and HRR hash in appstest.shinoguchi2020-05-291-1/+27
* more tests after getopt_long.c rev. 1.32;schwarze2020-05-271-10/+43
* This patch fixes one bug and one instance of undesirable behaviour.schwarze2020-05-271-9/+1
* document PKCS7_dataFinal(3);schwarze2020-05-273-3/+162
* minor cleanup ahead of the following work:schwarze2020-05-261-12/+14
* Add additional length checks for TLSv1.3 plaintext and inner plaintext.jsing2020-05-261-1/+6
* Previous commit caught a few errx() cases by accident. undo them.tb2020-05-241-25/+25
* Fix some stylistic nits from jsing.tb2020-05-241-8/+11
* Clear SSL_MODE_AUTO_RETRY in libtls, since we handle WANT_POLLIN correctly.jsing2020-05-241-1/+3
* include newlines in FAIL messagestb2020-05-241-108/+108
* address some nits from jsingtb2020-05-241-7/+11
* Minimally document PKCS7_dataInit(3).schwarze2020-05-244-5/+215
* Briefly mention the obsolete function OPENSSL_init(3).schwarze2020-05-241-7/+23
* The version detection doesn't work on bluhm's test machine, causingtb2020-05-241-3/+3
* Define REGRESS_TARGETS explicitly.tb2020-05-231-2/+4
* Enforce that SNI hostnames be correct as per rfc 6066 and 5980.beck2020-05-233-18/+159
* While the second SSL_CTX in this code is only used on servernametb2020-05-231-1/+2
* In ssl_lib.c revision 1.217, jsing enabled SSL_MODE_AUTO_RETRY bytb2020-05-232-2/+7
* Enable SSL_MODE_AUTO_RETRY by default.jsing2020-05-231-1/+2