boringssl/fuzz
Steven Valdez 924a352d1b Remove experimental TLS 1.3 short record header extension.
Due to middlebox and ecosystem intolerance, short record headers are going to
be unsustainable to deploy.

BUG=119

Change-Id: I20fee79dd85bff229eafc6aeb72e4f33cac96d82
Reviewed-on: https://boringssl-review.googlesource.com/14044
Reviewed-by: Steven Valdez <svaldez@google.com>
Commit-Queue: Steven Valdez <svaldez@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
2017-03-02 22:39:17 +00:00
..
cert_corpus Merge in upstream's certificate corpus. 2016-12-12 21:41:00 +00:00
client_corpus Updating fuzzer corpus 2017-03-02 22:26:38 +00:00
client_corpus_no_fuzzer_mode Updating fuzzer corpus 2017-03-02 22:26:38 +00:00
pkcs8_corpus
privkey_corpus
read_pem_corpus
server_corpus Updating fuzzer corpus 2017-03-02 22:26:38 +00:00
server_corpus_no_fuzzer_mode Updating fuzzer corpus 2017-03-02 22:26:38 +00:00
session_corpus
spki_corpus
ssl_ctx_api_corpus
cert.cc
client.cc Remove experimental TLS 1.3 short record header extension. 2017-03-02 22:39:17 +00:00
CMakeLists.txt
minimise_corpuses.sh
pkcs8.cc
privkey.cc
read_pem.cc
refresh_ssl_corpora.sh
server.cc Remove experimental TLS 1.3 short record header extension. 2017-03-02 22:39:17 +00:00
session.cc Remove |X509| things from SSL_SESSION. 2017-02-10 19:12:04 +00:00
spki.cc
ssl_ctx_api.cc Add new cipherlist-setting APIs that reject nonsense. 2017-02-22 00:09:27 +00:00