summaryrefslogtreecommitdiff
path: root/src (unfollow)
Commit message (Expand)AuthorFilesLines
2019-01-29Remove SSLv23 padding mode from rsautl's usage (left behind in a removaltb1-2/+1
2019-01-28spelling;jmc1-3/+3
2019-01-28Deduplicate a bunch of replicated code in the extension handlingbeck1-86/+50
2019-01-28Add tls_extension_seen(), a utility to know if a particular extensionbeck2-9/+15
2019-01-27zap a commented out line. 0RTT will need more thought thantb1-2/+1
2019-01-27refactor and clean up the code generating dot output.tb1-53/+76
2019-01-26Recent discussions about abort() potentially leaving key material inderaadt1-5/+8
2019-01-25print errors to stderrtb1-19/+21
2019-01-25sort output suffixestb1-2/+2
2019-01-25I am retiring my old email address; replace it with my OpenBSD one.millert27-61/+61
2019-01-24Add code to visualize the state machine. Both the state machine and thetb2-5/+79
2019-01-24Set pointer variables in tls13 handshake to NULL on clearbeck1-1/+5
2019-01-24set the NEGOTIATED flag in the flags argument rather thantb1-4/+4
2019-01-24Add server side of versions, keyshare, and client and server of cookiebeck5-28/+742
2019-01-24move the extensions_seen into the handshake structbeck3-6/+12
2019-01-24Remove SHA224 based sigalgs from use in TLS 1.2 as SHA224 is deprecated.beck3-37/+22
2019-01-23Correct ECDSA_SECP512R1 typo to ECDSA_SECP521R1beck2-6/+6
2019-01-23make whitespace inside curlies consistent; sort function prototypes.tb1-24/+24
2019-01-23Rename NUM_HANDSHAKE to handshake_count and make it a variabletb3-13/+47
2019-01-23assert.h is often misused. It should not be used in a librarybeck2-8/+5
2019-01-23Modify sigalgs extension processing to accomodate TLS 1.3.beck8-40/+93
2019-01-23revert previous, accidentally contained another diff in additionbeck10-408/+61
2019-01-23Modify sigalgs extension processing for TLS 1.3.beck10-61/+408
2019-01-23Sync the handshakes table with the generated table in regress.tb1-19/+19
2019-01-23incorrrect spellingtb1-2/+2
2019-01-23do not print the command in the print: targettb1-2/+2
2019-01-23Add a regression test that builds up the handshake state tabletb2-1/+399
2019-01-23Remove static from handshakes[][] so it is visible from regress/tb1-2/+2
2019-01-23No need to include <bsd.prog.mk> here.tb2-4/+2
2019-01-22sort sections, and add a missing verb to the EXAMPLES text;jmc1-24/+24
2019-01-22Wrap long lineotto1-4/+4
2019-01-22bump minors after symbol additiontb3-3/+3
2019-01-22Document SSL_get1_supported_ciphers(3) and SSL_get_client_ciphers(3).tb1-7/+61
2019-01-22Add a re-implementation of SSL_get1_supported_ciphers().tb3-2/+38
2019-01-22Provide SSL_get_client_ciphers().tb3-2/+12
2019-01-22Add missing symbols from the EC_KEY_METHOD port.tb1-0/+8
2019-01-22add support for xchacha20 and xchacha20-poly1305dlg10-11/+399
2019-01-21lenght -> lengthjsg2-3/+3
2019-01-21a few tweakstedu1-5/+9
2019-01-21Add example showing a proper comparison function, as many examples showotto1-3/+40
2019-01-21Use the actual handshake message type in the certificate request handler.jsing1-4/+2
2019-01-21Move ssl_cipher_list_to_bytes() and ssl_bytes_to_cipher_list() totb2-116/+120
2019-01-21Provide the initial TLSv1.3 client implementation.jsing5-25/+192
2019-01-21Wire up the handshake message send and recv actions.jsing2-4/+44
2019-01-21In ssl_lib.c rev. 1.197, jsing@ added TLSv1.3 support to SSL_get_version(3).schwarze1-2/+4
2019-01-21The main handshake loop can be shared between client and server.jsing2-29/+15
2019-01-21Use ssl_cipher_is_permitted() in ssl_cipher_list_to_bytes().tb1-9/+6
2019-01-21Add ssl_cipher_is_permitted(), an internal helper function thattb3-2/+49
2019-01-21Correct some rwstate handling that I broke when refactoring.jsing1-3/+13
2019-01-21Provide TLS 1.3 cipher AEAD/hash and legacy I/O handling functions.jsing3-2/+210