summaryrefslogtreecommitdiff
path: root/src (unfollow)
Commit message (Expand)AuthorFilesLines
2020-05-10Send dummy ChangeCipherSpec messages from the TLSv1.3 servertb3-3/+41
2020-05-10Honour SSL_VERIFY_FAIL_IF_NO_PEER_CERT in the TLSv1.3 server.jsing3-8/+16
2020-05-10Provide alert defines for TLSv1.3 and use in the TLSv1.3 code.jsing7-65/+97
2020-05-10Conditionalize sleep-before-retry in server code to only be done whenbeck1-3/+5
2020-05-10Provide an easy way to get debug information from TLSv1.3 handshakes.jsing2-3/+61
2020-05-10Use size_t for OCSP response length.jsing8-27/+35
2020-05-10Only reset TLS extension state when parsing client hello or server hello.jsing1-5/+7
2020-05-10Correct tlsext_ocsp_resplen check.jsing1-2/+2
2020-05-09Back out server side CCS sending. It breaks TLSv1.3 client communicationtb3-34/+3
2020-05-09Forcibly ensure that only PSS may be used with RSA in TLS 1.3.beck1-2/+8
2020-05-09Send dummy ChangeCipherSpec messages from the TLSv1.3 servertb3-3/+34
2020-05-09Send dummy ChangeCipherSpec messages from the TLSv1.3 client.jsing4-6/+45
2020-05-09Correct return value check to handle TLS13_IO_EOF case.jsing1-2/+2
2020-05-09Add a middlebox_compat flag and condition session ID randomisation on it.jsing3-4/+7
2020-05-09catch the other place this needs to changebeck1-2/+2
2020-05-09now that 3.1.1 is out the door as a stable release bump the developmentbeck1-2/+2
2020-05-09Add support for certificate status requests in TLS 1.3 clientbeck4-12/+81
2020-05-09Make the test for the legacy_compression_method vector in the ClientHellotb1-12/+7
2020-05-09Drop a redundant test. It's effectively doing the same test twicetb1-3/+2
2020-05-09On receiving an overlong session ID terminate with an illegal_parametertb1-1/+6
2020-05-09Add support for HelloRetryRequests in the TLSv1.3 server.jsing2-10/+73
2020-05-09crazy whitespace on one linetb1-2/+2
2020-05-09Pull the sending of alerts up into tls13_handshake_perform().jsing1-14/+11
2020-05-09Refactor tls13_server_hello_sent().jsing1-30/+36
2020-05-07On receiving a handshake or alert record with empty inner plaintext,tb1-1/+11
2020-05-06Bump LibreSSL version to 3.1.1tb1-3/+3
2020-05-04Use a larger (2048 bit) RSA test key.jsing1-1/+63
2020-05-04Fix out-of-bounds access in tables[][] that was exposed in bluhm'stb1-6/+8
2020-05-03Accept two ChangeCipherSpec messages during a TLSv1.3 handshake.jsing1-3/+3
2020-05-02Add const to TLS1.3 internal vectorsinoguchi2-14/+14
2020-04-30Disallow setting the AES-GCM IV length to 0tb1-1/+5
2020-04-29tls13_record_layer internal functions to static in libsslinoguchi1-4/+4
2020-04-29tls13_handshake internal functions to static in libsslinoguchi1-11/+12
2020-04-28Move legacy stack interfacing functions into tls13_legacy.c.jsing4-199/+206
2020-04-28Rename tls13_client_synthetic_handshake_message() and move to tls13_lib.c.jsing3-47/+48
2020-04-27Shuffle some functions around.jsing2-329/+328
2020-04-27Fix two bugs in the AES-CBC-PKCS5 tests that didn't hide failing tests:tb1-3/+3
2020-04-27Fix a logic error that hid the failing ZeroLengthIv tests.tb1-3/+3
2020-04-27Disallow the use of zero length IVs in AES-GCM viatb3-3/+15
2020-04-26Minimal maintenance to make this mess slightly less confusing:schwarze1-10/+10
2020-04-26fix the description; from andras farkasjmc1-5/+4
2020-04-26Display TLSv1.3 extension type with openssl(1) -tlsextdebuginoguchi1-7/+49
2020-04-26s_client: fix use of possibly uninitialized valuesinoguchi1-2/+2
2020-04-25A comma is not appropriate here, use a semicolonjca1-2/+2
2020-04-25In s_server.c rev. 1.33, jsing added support for "openssl s_server -groups";schwarze1-6/+18
2020-04-25Switch to NEGOTIATED when using WITHOUT_HRR.jsing1-4/+9
2020-04-25Discourage use of RES_USE_INET6jca1-1/+5
2020-04-25Fix RES_USE_INET6 descriptionjca1-7/+9
2020-04-25Move unsupported, obsolete ciphers and deprecated aliases out ofschwarze1-31/+29
2020-04-25tweak the wording to make it clearer under which conditions exactlyschwarze1-4/+4