summaryrefslogtreecommitdiff
path: root/src (unfollow)
Commit message (Expand)AuthorFilesLines
2020-04-27Disallow the use of zero length IVs in AES-GCM viatb3-3/+15
2020-04-26Minimal maintenance to make this mess slightly less confusing:schwarze1-10/+10
2020-04-26fix the description; from andras farkasjmc1-5/+4
2020-04-26Display TLSv1.3 extension type with openssl(1) -tlsextdebuginoguchi1-7/+49
2020-04-26s_client: fix use of possibly uninitialized valuesinoguchi1-2/+2
2020-04-25A comma is not appropriate here, use a semicolonjca1-2/+2
2020-04-25In s_server.c rev. 1.33, jsing added support for "openssl s_server -groups";schwarze1-6/+18
2020-04-25Switch to NEGOTIATED when using WITHOUT_HRR.jsing1-4/+9
2020-04-25Discourage use of RES_USE_INET6jca1-1/+5
2020-04-25Fix RES_USE_INET6 descriptionjca1-7/+9
2020-04-25Move unsupported, obsolete ciphers and deprecated aliases out ofschwarze1-31/+29
2020-04-25tweak the wording to make it clearer under which conditions exactlyschwarze1-4/+4
2020-04-22Revise regress to match state transition changes.jsing1-11/+13
2020-04-22Improve TLSv1.3 state machine for HelloRetryRequest handling.jsing5-66/+104
2020-04-21Handle TLSv1.3 key shares other than X25519 on the server side.jsing2-16/+34
2020-04-21Consolidate TLSv1.3 constants.jsing3-40/+47
2020-04-19Add -groups option to openssl(1) s_server.jsing2-35/+31
2020-04-19Provide TLSv1.3 cipher suite aliases to match the names used in RFC 8446.jsing1-2/+25
2020-04-18Fix wrapping/indentation.jsing1-4/+3
2020-04-18Expose the peer ephemeral public key used for TLSv1.3 key exchange.jsing5-36/+79
2020-04-18Tweak previous active cipher suite code.jsing1-6/+5
2020-04-18Allow more key share groups for TLSv1.3.jsing1-21/+12
2020-04-17Only include TLSv1.3 cipher suites if there are active cipher suites.jsing1-2/+10
2020-04-17Update key share regress to match previous change.jsing1-4/+4
2020-04-17Generate client key share using our preferred group.jsing4-25/+37
2020-04-16Remove AUTHORS section. This follows what is done in strstr.3claudio1-4/+2
2020-04-16Replace the simple memmem() implementation with a version that is O(n)claudio1-47/+167
2020-04-16Resync our strstr.c with the musl version. Removes some debug code andclaudio1-11/+3
2020-04-14Update in several respects:schwarze1-13/+11
2020-04-14add the missing sentence "LibreSSL no longer provides any suchschwarze1-2/+3
2020-04-14Delete the three sentences listing the ciphers currently includedschwarze1-15/+2
2020-04-11Document the TLSv1.3 control word, update the description of theschwarze1-4/+30
2020-04-10sync cert.pem with Mozilla's root ca list, ok beck@sthen1-276/+343
2020-04-10When printing the serialNumber, fall back to the colon separated hextb1-2/+4
2020-04-09Revise test to handle the fact that TLSv1.3 cipher suites are now beingjsing1-2/+4
2020-04-09Include TLSv1.3 cipher suites unless cipher string references TLSv1.3.jsing1-6/+19
2020-04-09Test both SSLv3 (aka pre-TLSv1.2) and TLSv1.2 cipher suites with TLS.jsing1-1/+1
2020-04-09Tidy line wrapping and remove an extra blank line.jsing1-4/+3
2020-04-09ssl_aes_is_accelerated() returns a boolean - treat it as such, rather thanjsing1-2/+2
2020-04-08Ensure legacy session ID is persistent during client TLS session.jsing1-9/+14
2020-04-06Re-enable the client test now that it passes again.jsing1-2/+2
2020-04-06Minor code improvements.jsing1-3/+3
2020-04-06Add tests that cover TLSv1.2 and disable those that trigger TLSv1.3.jsing1-3/+32
2020-04-06Zero the client random field in the TLSv1.2 golden value.jsing1-5/+5
2020-04-06Improve comparision with test data.jsing1-7/+9
2020-04-06Dump the test data when the lengths differ in order to aid debugging.jsing1-0/+3
2020-04-06Use errx() if we fail to build the client hello.jsing1-1/+1
2020-04-06Send a zero-length session identifier if TLSv1.3 is not enabled.jsing1-4/+7
2020-03-30"eventually" came and went back in 2004.libressl-v3.1.0martijn1-3/+1
2020-03-30Void functions obviously do not return values; no need to elaborate.schwarze5-31/+10