summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
...
* Test both SSLv3 (aka pre-TLSv1.2) and TLSv1.2 cipher suites with TLS.jsing2020-04-091-1/+1
* Tidy line wrapping and remove an extra blank line.jsing2020-04-091-4/+3
* ssl_aes_is_accelerated() returns a boolean - treat it as such, rather thanjsing2020-04-091-2/+2
* Ensure legacy session ID is persistent during client TLS session.jsing2020-04-081-9/+14
* Re-enable the client test now that it passes again.jsing2020-04-061-2/+2
* Minor code improvements.jsing2020-04-061-3/+3
* Add tests that cover TLSv1.2 and disable those that trigger TLSv1.3.jsing2020-04-061-3/+32
* Zero the client random field in the TLSv1.2 golden value.jsing2020-04-061-5/+5
* Improve comparision with test data.jsing2020-04-061-7/+9
* Dump the test data when the lengths differ in order to aid debugging.jsing2020-04-061-0/+3
* Use errx() if we fail to build the client hello.jsing2020-04-061-1/+1
* Send a zero-length session identifier if TLSv1.3 is not enabled.jsing2020-04-061-4/+7
* "eventually" came and went back in 2004.libressl-v3.1.0martijn2020-03-301-3/+1
* Void functions obviously do not return values; no need to elaborate.schwarze2020-03-305-31/+10
* Void functions obviously do not return values; no need to elaborate.schwarze2020-03-295-28/+10
* Be concise: do not say that void functions return no values, that's obvious.schwarze2020-03-283-22/+6
* Fix ASN1 print functionsinoguchi2020-03-241-6/+13
* Add a test program for getopt(3) that is adequate for manual testingschwarze2020-03-234-2/+174
* Consistently spell 'unsigned' as 'unsigned int', as style(9) seemstb2020-03-167-44/+45
* Adapt to tls13_record_layer.c r1.30 (the sequence number shouldn't wrap).tb2020-03-161-2/+2
* The RFC is clear (section 5.3) that sequence number should never wrap.tb2020-03-161-5/+12
* Increment a few more sequence numbers where the carry is close totb2020-03-131-1/+41
* Remove dtls1_enc().jsing2020-03-135-222/+11
* Add regress for TLSv1.3 sequence number handling.jsing2020-03-133-1/+135
* Correct TLSv1.3 sequence number increment and wrapping check.jsing2020-03-131-3/+3
* Add missing $OpenBSD$ tag.jsing2020-03-131-0/+1
* Add regress for CBB_add_space().jsing2020-03-131-1/+41
* Ensure that CBB_add_space() always provides zeroed memory.jsing2020-03-131-1/+2
* Use calloc() rather than malloc() when allocating initial CBB buffer.jsing2020-03-121-4/+3
* Use calloc() rather than malloc() when allocating buffers.jsing2020-03-121-3/+3
* Stop overloading the record type for padding length.jsing2020-03-125-13/+10
* Use internal versions of SSL3_BUFFER, SSL3_RECORD and DTLS1_RECORD_DATA.jsing2020-03-129-53/+83
* Use ctx->hs->secrets rather than the S3I(s) version.jsing2020-03-102-4/+4
* Update to follow handshake enum removal.jsing2020-03-101-7/+1
* Remove some unnecessary handshake enums/functions.jsing2020-03-104-26/+4
* Add a return value check to tls13_buffer_extend().jsing2020-03-101-1/+4
* Remove the enc function pointers.jsing2020-03-106-22/+12
* Import openssl-1.1.1d test data to base64test.cinoguchi2020-03-101-1/+97
* Modify regress base64test.cinoguchi2020-03-101-11/+14
* cstyle in illumos noticed some weird syntax, which this fixes.dlg2020-03-091-4/+4
* RFC 8446, section 4.1.3: If a TLSv1.2 client receives a ServerHello fortb2020-03-061-1/+27
* TLSv1.3 servers that intend to downgrade are required to set the lasttb2020-03-061-4/+8
* Check high bit for base64 decodeinoguchi2020-03-041-2/+10
* Fix base64 processing of long linesinoguchi2020-03-031-99/+66
* The decryption_failed alert must not be sent by compliant implementations.tb2020-02-231-2/+2
* According to RFC 8446, Section 4.4.4, recipients of incorrect Finishedtb2020-02-232-4/+4
* Remove the s2n macro now that it is finally unused.jsing2020-02-211-4/+1
* Convert the SSL/TLS record creation code to CBB.jsing2020-02-211-18/+28
* Convert the DTLS header creation code to CBB.jsing2020-02-211-20/+27
* Remove some commented code, remove some pointless comments and move somejsing2020-02-211-17/+6