summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
...
* Remove expired certificate, ok tb@sthen2020-06-011-53/+1
* Enable the test-tls13-zero-length-data.py test, skipping thetb2020-06-011-8/+10
* Enable test-dhe-rsa-key-exchange-with-bad-messages.pytb2020-06-011-4/+2
* Send an illegal_parameter alert if a client sends us invalid DH keytb2020-06-011-3/+15
* Add a mechanism to set an alert in those parts of the read half oftb2020-06-011-3/+21
* bump to LibreSSL 3.2.1libressl-v3.2.0bcook2020-06-011-3/+3
* Replace ssl_max_server_version() with ssl_downgrade_max_version()jsing2020-05-313-30/+6
* When building a chain look for non-expired certificates first.jsing2020-05-311-8/+29
* Correct downgrade sentinels when a version pinned method is in use.jsing2020-05-314-7/+40
* Fix printing long doubles on architectures with hm and lm bits.mortimer2020-05-311-1/+9
* Improve server certificate selection for TLSv1.3.jsing2020-05-292-23/+94
* Handle the case where we receive a valid 0 byte application data record.jsing2020-05-291-1/+10
* Wire up the servername callback in the TLSv1.3 server.jsing2020-05-293-3/+45
* Mop up servername_done, which is unused.jsing2020-05-293-14/+3
* Add checks for SH downgrade sentinel and HRR hash in appstest.shinoguchi2020-05-291-1/+27
* more tests after getopt_long.c rev. 1.32;schwarze2020-05-271-10/+43
* This patch fixes one bug and one instance of undesirable behaviour.schwarze2020-05-271-9/+1
* document PKCS7_dataFinal(3);schwarze2020-05-273-3/+162
* minor cleanup ahead of the following work:schwarze2020-05-261-12/+14
* Add additional length checks for TLSv1.3 plaintext and inner plaintext.jsing2020-05-261-1/+6
* Previous commit caught a few errx() cases by accident. undo them.tb2020-05-241-25/+25
* Fix some stylistic nits from jsing.tb2020-05-241-8/+11
* Clear SSL_MODE_AUTO_RETRY in libtls, since we handle WANT_POLLIN correctly.jsing2020-05-241-1/+3
* include newlines in FAIL messagestb2020-05-241-108/+108
* address some nits from jsingtb2020-05-241-7/+11
* Minimally document PKCS7_dataInit(3).schwarze2020-05-244-5/+215
* Briefly mention the obsolete function OPENSSL_init(3).schwarze2020-05-241-7/+23
* The version detection doesn't work on bluhm's test machine, causingtb2020-05-241-3/+3
* Define REGRESS_TARGETS explicitly.tb2020-05-231-2/+4
* Enforce that SNI hostnames be correct as per rfc 6066 and 5980.beck2020-05-233-18/+159
* While the second SSL_CTX in this code is only used on servernametb2020-05-231-1/+2
* In ssl_lib.c revision 1.217, jsing enabled SSL_MODE_AUTO_RETRY bytb2020-05-232-2/+7
* Enable SSL_MODE_AUTO_RETRY by default.jsing2020-05-231-1/+2
* Wire up SSL_MODE_AUTO_RETRY mode to retrying after PHH messages.jsing2020-05-232-2/+8
* Provide the option to retry or return after post-handshake messages.jsing2020-05-232-4/+16
* fix a confusingly wrapped linetb2020-05-231-3/+3
* Avoid an out-of-bounds array access in the s_server.tb2020-05-231-1/+3
* Do not assume that server_group != 0 or tlsext_supportedgroups != NULLtb2020-05-232-9/+15
* sockaddr should be sockaddr_storage, otherwise "openssl s_client -6 -dtls1"deraadt2020-05-221-3/+4
* Ensure we only attach an ocsp staple to a leaf certificate, becausebeck2020-05-222-5/+16
* Simplify: transform a dangling else into an early return andtb2020-05-211-20/+20
* Make ssl_set_cert_masks() more consistent and closer to readable.jsing2020-05-211-44/+27
* Avoid a shadowing issue by renaming cbs and cbb to cbb_hs and cbb_hs,tb2020-05-211-8/+7
* A failure of tls13_handshake_msg_new() could lead to a NULL dereftb2020-05-211-11/+15
* beck fixed most of the keyupdate tests. update annotationtb2020-05-211-3/+8
* Actually set the hrr flag when sending a HelloRetryRequest.jsing2020-05-211-1/+3
* hook tlsfuzzer to regresstb2020-05-211-1/+2
* Add a harness that runs tests from tlsfuzzertb2020-05-212-0/+781
* Revert 1.43 - this fix for PHH in blocking mode breaks SSL_accept andbeck2020-05-201-2/+2
* new manual page for PKCS7_set_content(3) and PKCS7_content_new(3);schwarze2020-05-204-5/+127