summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
...
* Restrict to use up to TLSv1.2 for test_server_client in appstest.shinoguchi2020-01-261-7/+7
* Avoid 32 bit right shift with unsigned int in crypto/cast/cast_lcl.hinoguchi2020-01-261-2/+2
* tweak previous; ok tbjmc2020-01-261-3/+3
* typotb2020-01-261-2/+2
* Document the change in EVP_chacha20(3).tb2020-01-261-3/+5
* Improve the comment explaining why the previous change matches OpenSSL'stb2020-01-261-8/+15
* When an SSL method is set, bump the max version back to that of thejsing2020-01-261-1/+10
* When switching back to a legacy client or server, ensure we reset thejsing2020-01-262-2/+4
* Fix basement bug where record layer would not correctly deal withbeck2020-01-261-1/+4
* Add server side support for requesting client certificates in tls 1.3beck2020-01-261-4/+173
* Add client certificate support for tls 1.3beck2020-01-262-15/+149
* Add back the tests that were deleted in previous but not containedtb2020-01-261-1/+9
* Add sigalgs for server side to enable client certificate processingbeck2020-01-261-5/+34
* server sigalgs test is now bogus, disable for nowbeck2020-01-261-2/+3
* Adjust tests to match the change in EVP_chacha20().tb2020-01-262-11/+22
* Move pad and verify context into tls13_lib.cbeck2020-01-264-68/+60
* Adjust EVP_chacha20()'s behavior to match OpenSSL's semantics:tb2020-01-261-7/+14
* Add an underbar for consistency.tb2020-01-251-2/+2
* Disable cert interop tests for now.jsing2020-01-251-2/+2
* Actually disable cipher interop tests.jsing2020-01-251-3/+3
* Disable the cipher interop tests.jsing2020-01-251-3/+4
* Accept both TLSv1.2 and TLSv1.3 protocols for netcat.jsing2020-01-251-4/+3
* Disable session regress for libressl client talking to openssl11 server.jsing2020-01-251-1/+2
* Revert change to certificate request check from r1.45.jsing2020-01-251-3/+3
* Only perform the downgrade check if our max version is less than TLSv1.3.jsing2020-01-251-15/+17
* Preserve the transcript hash for the client finished message,beck2020-01-251-2/+3
* Support legacy message callbacks. First step for SSL_set_msg_callback(3)tb2020-01-253-3/+40
* Correct value for SSL_TLSEXT_MSG_HRR.jsing2020-01-251-2/+2
* Only discard the extension block for client hello and server hellojsing2020-01-251-2/+3
* Only send an RI extension for pre-TLSv1.3 versions.jsing2020-01-251-2/+2
* It is possible to receive a pre-TLSv1.3 alert in response to a TLSv1.3jsing2020-01-253-4/+24
* Correct backwards test so that we may accept a certificate requstbeck2020-01-251-3/+3
* add a couple of XXX for future cleanuptb2020-01-251-1/+4
* Disable the client hello message regress test for now.jsing2020-01-251-2/+2
* Ensure that TLSv1.0 and TLSv1.1 are enabled before running SSLv2 clientjsing2020-01-251-5/+10
* Teach openssl s_client a bit about TLSv1.3.tb2020-01-241-2/+17
* Complete the initial TLSv1.3 implementation.jsing2020-01-243-14/+300
* Preserve the TLS transcript at additional points.jsing2020-01-241-9/+23
* Permit 0 length writes, because openssl s_client is specialbeck2020-01-241-2/+2
* Store the legacy session identifier from the ClientHello so we can actuallyjsing2020-01-241-1/+10
* Switch to encrypted records in the TLSv1.3 server.jsing2020-01-243-4/+78
* Enable SSL_ENC_FLAG_SIGALGS on TLSv1_3_enc_data.jsing2020-01-241-2/+2
* Add strings for SSL_aTLS1_3 and SSL_kTLS1_3 to SSL_CIPHER_description().jsing2020-01-241-1/+7
* Fix breakage in SSL_connect, SSL_accept, etc. by not propagatingbeck2020-01-243-13/+42
* Implement client hello processing in the TLSv1.3 server.jsing2020-01-233-10/+58
* Correct several issues in the current TLSv1.3 server code.jsing2020-01-231-6/+15
* When certificate validation fails, we must send a DECRYPT_ERROR alertbeck2020-01-231-3/+6
* Remove the ssl_get_message function pointer from SSL_METHOD_INTERNAL.jsing2020-01-236-47/+27
* Implement sending client certificate requests for 1.3 serverbeck2020-01-231-1/+13
* Correctly handle TLSv1.3 ciphers suites in ssl3_choose_cipher().jsing2020-01-234-5/+30