summaryrefslogtreecommitdiff
path: root/src/usr.bin/nc/nc.1 (unfollow)
Commit message (Expand)AuthorFilesLines
2020-04-10sync cert.pem with Mozilla's root ca list, ok beck@sthen1-276/+343
2020-04-10When printing the serialNumber, fall back to the colon separated hextb1-2/+4
2020-04-09Revise test to handle the fact that TLSv1.3 cipher suites are now beingjsing1-2/+4
2020-04-09Include TLSv1.3 cipher suites unless cipher string references TLSv1.3.jsing1-6/+19
2020-04-09Test both SSLv3 (aka pre-TLSv1.2) and TLSv1.2 cipher suites with TLS.jsing1-1/+1
2020-04-09Tidy line wrapping and remove an extra blank line.jsing1-4/+3
2020-04-09ssl_aes_is_accelerated() returns a boolean - treat it as such, rather thanjsing1-2/+2
2020-04-08Ensure legacy session ID is persistent during client TLS session.jsing1-9/+14
2020-04-06Re-enable the client test now that it passes again.jsing1-2/+2
2020-04-06Minor code improvements.jsing1-3/+3
2020-04-06Add tests that cover TLSv1.2 and disable those that trigger TLSv1.3.jsing1-3/+32
2020-04-06Zero the client random field in the TLSv1.2 golden value.jsing1-5/+5
2020-04-06Improve comparision with test data.jsing1-7/+9
2020-04-06Dump the test data when the lengths differ in order to aid debugging.jsing1-0/+3
2020-04-06Use errx() if we fail to build the client hello.jsing1-1/+1
2020-04-06Send a zero-length session identifier if TLSv1.3 is not enabled.jsing1-4/+7
2020-03-30"eventually" came and went back in 2004.libressl-v3.1.0martijn1-3/+1
2020-03-30Void functions obviously do not return values; no need to elaborate.schwarze5-31/+10
2020-03-29Void functions obviously do not return values; no need to elaborate.schwarze5-28/+10
2020-03-28Be concise: do not say that void functions return no values, that's obvious.schwarze3-22/+6
2020-03-24Fix ASN1 print functionsinoguchi1-6/+13
2020-03-23Add a test program for getopt(3) that is adequate for manual testingschwarze4-2/+174
2020-03-16Consistently spell 'unsigned' as 'unsigned int', as style(9) seemstb7-44/+45
2020-03-16Adapt to tls13_record_layer.c r1.30 (the sequence number shouldn't wrap).tb1-2/+2
2020-03-16The RFC is clear (section 5.3) that sequence number should never wrap.tb1-5/+12
2020-03-13Increment a few more sequence numbers where the carry is close totb1-1/+41
2020-03-13Remove dtls1_enc().jsing5-222/+11
2020-03-13Add regress for TLSv1.3 sequence number handling.jsing3-1/+135
2020-03-13Correct TLSv1.3 sequence number increment and wrapping check.jsing1-3/+3
2020-03-13Add missing $OpenBSD$ tag.jsing1-0/+1
2020-03-13Add regress for CBB_add_space().jsing1-1/+41
2020-03-13Ensure that CBB_add_space() always provides zeroed memory.jsing1-1/+2
2020-03-12Use calloc() rather than malloc() when allocating initial CBB buffer.jsing1-4/+3
2020-03-12Use calloc() rather than malloc() when allocating buffers.jsing1-3/+3
2020-03-12Stop overloading the record type for padding length.jsing5-13/+10
2020-03-12Use internal versions of SSL3_BUFFER, SSL3_RECORD and DTLS1_RECORD_DATA.jsing9-53/+83
2020-03-10Use ctx->hs->secrets rather than the S3I(s) version.jsing2-4/+4
2020-03-10Update to follow handshake enum removal.jsing1-7/+1
2020-03-10Remove some unnecessary handshake enums/functions.jsing4-26/+4
2020-03-10Add a return value check to tls13_buffer_extend().jsing1-1/+4
2020-03-10Remove the enc function pointers.jsing6-22/+12
2020-03-10Import openssl-1.1.1d test data to base64test.cinoguchi1-1/+97
2020-03-10Modify regress base64test.cinoguchi1-11/+14
2020-03-09cstyle in illumos noticed some weird syntax, which this fixes.dlg1-4/+4
2020-03-06RFC 8446, section 4.1.3: If a TLSv1.2 client receives a ServerHello fortb1-1/+27
2020-03-06TLSv1.3 servers that intend to downgrade are required to set the lasttb1-4/+8
2020-03-04Check high bit for base64 decodeinoguchi1-2/+10
2020-03-03Fix base64 processing of long linesinoguchi1-99/+66
2020-02-23The decryption_failed alert must not be sent by compliant implementations.tb1-2/+2
2020-02-23According to RFC 8446, Section 4.4.4, recipients of incorrect Finishedtb2-4/+4