summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto (unfollow)
Commit message (Expand)AuthorFilesLines
2020-01-26Avoid 32 bit right shift with unsigned int in crypto/cast/cast_lcl.hinoguchi1-2/+2
2020-01-26tweak previous; ok tbjmc1-3/+3
2020-01-26typotb1-2/+2
2020-01-26Document the change in EVP_chacha20(3).tb1-3/+5
2020-01-26Improve the comment explaining why the previous change matches OpenSSL'stb1-8/+15
2020-01-26When an SSL method is set, bump the max version back to that of thejsing1-1/+10
2020-01-26When switching back to a legacy client or server, ensure we reset thejsing2-2/+4
2020-01-26Fix basement bug where record layer would not correctly deal withbeck1-1/+4
2020-01-26Add server side support for requesting client certificates in tls 1.3beck1-4/+173
2020-01-26Add client certificate support for tls 1.3beck2-15/+149
2020-01-26Add back the tests that were deleted in previous but not containedtb1-1/+9
2020-01-26Add sigalgs for server side to enable client certificate processingbeck1-5/+34
2020-01-26server sigalgs test is now bogus, disable for nowbeck1-2/+3
2020-01-26Adjust tests to match the change in EVP_chacha20().tb2-11/+22
2020-01-26Move pad and verify context into tls13_lib.cbeck4-68/+60
2020-01-26Adjust EVP_chacha20()'s behavior to match OpenSSL's semantics:tb1-7/+14
2020-01-25Add an underbar for consistency.tb1-2/+2
2020-01-25Disable cert interop tests for now.jsing1-2/+2
2020-01-25Actually disable cipher interop tests.jsing1-3/+3
2020-01-25Disable the cipher interop tests.jsing1-3/+4
2020-01-25Accept both TLSv1.2 and TLSv1.3 protocols for netcat.jsing1-4/+3
2020-01-25Disable session regress for libressl client talking to openssl11 server.jsing1-1/+2
2020-01-25Revert change to certificate request check from r1.45.jsing1-3/+3
2020-01-25Only perform the downgrade check if our max version is less than TLSv1.3.jsing1-15/+17
2020-01-25Preserve the transcript hash for the client finished message,beck1-2/+3
2020-01-25Support legacy message callbacks. First step for SSL_set_msg_callback(3)tb3-3/+40
2020-01-25Correct value for SSL_TLSEXT_MSG_HRR.jsing1-2/+2
2020-01-25Only discard the extension block for client hello and server hellojsing1-2/+3
2020-01-25Only send an RI extension for pre-TLSv1.3 versions.jsing1-2/+2
2020-01-25It is possible to receive a pre-TLSv1.3 alert in response to a TLSv1.3jsing3-4/+24
2020-01-25Correct backwards test so that we may accept a certificate requstbeck1-3/+3
2020-01-25add a couple of XXX for future cleanuptb1-1/+4
2020-01-25Disable the client hello message regress test for now.jsing1-2/+2
2020-01-25Ensure that TLSv1.0 and TLSv1.1 are enabled before running SSLv2 clientjsing1-5/+10
2020-01-24Teach openssl s_client a bit about TLSv1.3.tb1-2/+17
2020-01-24Complete the initial TLSv1.3 implementation.jsing3-14/+300
2020-01-24Preserve the TLS transcript at additional points.jsing1-9/+23
2020-01-24Permit 0 length writes, because openssl s_client is specialbeck1-2/+2
2020-01-24Store the legacy session identifier from the ClientHello so we can actuallyjsing1-1/+10
2020-01-24Switch to encrypted records in the TLSv1.3 server.jsing3-4/+78
2020-01-24Enable SSL_ENC_FLAG_SIGALGS on TLSv1_3_enc_data.jsing1-2/+2
2020-01-24Add strings for SSL_aTLS1_3 and SSL_kTLS1_3 to SSL_CIPHER_description().jsing1-1/+7
2020-01-24Fix breakage in SSL_connect, SSL_accept, etc. by not propagatingbeck3-13/+42
2020-01-23Implement client hello processing in the TLSv1.3 server.jsing3-10/+58
2020-01-23Correct several issues in the current TLSv1.3 server code.jsing1-6/+15
2020-01-23When certificate validation fails, we must send a DECRYPT_ERROR alertbeck1-3/+6
2020-01-23Remove the ssl_get_message function pointer from SSL_METHOD_INTERNAL.jsing6-47/+27
2020-01-23Implement sending client certificate requests for 1.3 serverbeck1-1/+13
2020-01-23Correctly handle TLSv1.3 ciphers suites in ssl3_choose_cipher().jsing4-5/+30
2020-01-23Build the encrypted extensions for the 1.3 serverbeck1-2/+8