summaryrefslogtreecommitdiff
path: root/src/lib/libc/stdlib/recallocarray.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2019-11-18Add regress for the updating of sever and client application secretsbeck1-2/+47
2019-11-17Change tls13_record_layer_phh() to take a CBS as this avoids ownershipjsing2-8/+6
issues and makes call sites cleaner. ok beck@
2019-11-17Correct update of application traffic secrets to use an empty contextbeck1-3/+7
rather than the hash of an empty context ok jsing@
2019-11-17Bring back the ssl_shutdown internal method pointer.jsing3-4/+21
For now ssl3_shutdown() is called in all cases, however TLSv1.3 will soon get its own version. ok beck@
2019-11-17Add a reference for the non-standard post-handshake handshake (PHH).tb1-2/+2
ok beck, jsing
2019-11-17Ensure that we are never operating in plaintext mode once the handshakejsing1-1/+7
is complete, which should never occur. ok beck@
2019-11-17fail to usage if extra argv are presentderaadt1-8/+4
noticed by jsing and beck, ok tedu
2019-11-17Provide framework for sending alerts and post-handshake handshake messages.jsing2-15/+174
Discussed at length with beck@ ok beck@ tb@
2019-11-17indent with a tab instead of 8 spacestb1-2/+2
2019-11-17Move the TLSv1.3 server message handling stubs.jsing2-125/+125
2019-11-17Add the initial framework for the TLSv1.3 server.jsing3-3/+84
ok beck@
2019-11-17tls13_connect() should be static.jsing1-2/+2
2019-11-17Fix backoff to legacy when in client auth mode.beck1-2/+2
ok jsing@
2019-11-17Drop back to the legacy tls method if we are doing client authenticaitonbeck1-1/+7
from a tls 1.3 connection, for now. ok jsing@
2019-11-17Separate the callbacks for recieved and completed post handshake messagesbeck3-10/+22
from the record layer ok jsing@
2019-11-16Allow 1.3 ciphers in libtls.beck1-2/+2
ok jsing@
2019-11-16Revert previous deduplication diff, I broke portable in a strange way.beck1-47/+58
I'll figure it out a bit later. Found and diagnosed by inoguchi@
2019-11-16Allow portable to override the default CA bundle locationbeck2-3/+7
ok kinichiro@ jsing@
2019-11-15Deduplicate some extension processing code.beck1-58/+47
ok tb@ inoguchi@
2019-11-14Add missing cross-reference to NOTES section.millert1-3/+3
OK kn@ tb@
2019-11-13refactor the nc pool loop to not shut down the socket early, andbeck1-36/+64
to handle tls_shutdown correctly if using TLS, doing tls_shutdown correctly if we are using the -N flag ok sthen@
2019-11-10It has been called to my attention that the cookie monster ascii artbeck1-17/+7
in this test which I had obtained from a site purporting it to be free for use with artist attribtion might not be. After looking at at some other muppett ascii art for inspiration I am replacing this with my own ascii art muppet to replace the previously used cookie monster. The copyright for the art is the same as my code.
2019-11-09Add test for req -addext in appstest.shinoguchi1-1/+2
2019-11-06Check return value and remove unnecessary variableinoguchi1-7/+7
- Check NCONF_new() return value - Remove unnecessary 'i' comments from jsing@
2019-11-06Add -addext option to openssl(1) req subcommandinoguchi1-3/+133
First step of adding -addext option to openssl(1) req from OpenSSL 1.1.1d. ok jsing@
2019-11-06use curly braces for consistencytb1-2/+2
2019-11-05Remove trailing space in appstest.shinoguchi1-15/+15
2019-11-05Add test for cms in appstest.shinoguchi1-1/+57
2019-11-04Allow ip addresses as argument to SSL_set1_host() but be careful to nototto1-2/+14
poison the context. ok and help jsing@ tb@
2019-11-04Fix an out of bound read/write when using a proxy.millert2-11/+21
From Lucas AT sexy DOT is. OK job@ kn@
2019-11-04Indent labels for diffability.jsing1-5/+5
2019-11-04Remove spaces between * and variable names.jsing1-25/+25
2019-11-04Remove explicit NULL checks before *_free() calls.jsing1-21/+14
2019-11-04Hook openssl(1) cms back up.jsing3-4/+8
2019-11-04Currently we need to include pem.h before cms.h...jsing1-2/+3
2019-11-04Remove engine argument from load_cert() calls.jsing1-8/+8
This was cleaned up after cms went to the attic.