summaryrefslogtreecommitdiff
path: root/src (unfollow)
Commit message (Expand)AuthorFilesLines
2020-01-22Avoid modifying alert in the success path.tb1-11/+17
2020-01-22Enable the TLSv1.3 client in libssl.jsing1-2/+3
2020-01-22Correct includes check for libtls.jsing1-2/+2
2020-01-22Add checks to ensure that lib{crypto,ssl,tls} public headers have actuallyjsing3-3/+33
2020-01-22delete wasteful ;;deraadt1-2/+2
2020-01-22Move guards from public to internal headers, and fix not use values.beck2-8/+7
2020-01-22Simplify header installation by combining the HDRS and HDRS_GEN loops.jsing1-9/+2
2020-01-22Note in the man page that the default protocols list includes 1.3beck1-4/+4
2020-01-22Enable TLS version 1.3 in the default protocols for libtls.beck1-2/+2
2020-01-22Simplify the peekaboo code.jsing1-35/+6
2020-01-22Implement support for SSL_peek() in the TLSv1.3 record layer.jsing3-14/+39
2020-01-22After the ClientHello has been sent or received and before the peer'stb4-8/+22
2020-01-22Add -peekaboo option to s_client, to test SSL_peekbeck1-4/+66
2020-01-22Correctly set the legacy version when TLSv1.3 is building a client hello.jsing1-4/+11
2020-01-22Don't add an extra unknown error if we got a fatal alertbeck1-2/+3
2020-01-22The legacy_record_version must be set to TLS1_2_VERSION excepttb4-9/+30
2020-01-22Hook up the TLSv1.3 legacy shutdown code.jsing1-2/+2
2020-01-22Add minimal support for hello retry request for RFC conformance.beck4-11/+71
2020-01-22Split the TLSv1.3 guards into separate client and server guards.jsing3-6/+13
2020-01-22Implement close-notify and SSL_shutdown() handling for the TLSv1.3 client.jsing3-9/+76
2020-01-21Correct legacy fallback for TLSv1.3 client.jsing3-9/+30
2020-01-21Remove redundant ASN1_INTEGER_set call in PKCS7_set_typeinoguchi1-2/+1
2020-01-21Provide SSL_R_UNKNOWN.jsing3-5/+7
2020-01-21Clear and free the tls13_ctx that hangs off an SSL *s fromtb2-2/+8
2020-01-21Add alert processing in tls client code, by adding alert to thebeck3-19/+30
2020-01-20Add alerts to the tls 1.3 record layer and handshake layerbeck2-49/+29
2020-01-20Provide an error framework for use with the TLSv1.3 code.jsing5-7/+151
2020-01-20Update libtls config regress to include TLSv1.3.jsing1-9/+16
2020-01-20Add support for TLSv1.3 as a protocol to libtls.jsing4-11/+20
2020-01-17Free pss in RSA_freeinoguchi1-1/+2
2020-01-16Check fpu functions without setjmp/longjmp before testing the latter.bluhm3-13/+71
2020-01-14bump to 3.1.0bcook1-3/+3
2020-01-13Document how to make getopt_long(3) process arguments in order and stopstsp1-2/+18
2020-01-13Make clean should not require SUDO.bluhm1-3/+1
2020-01-13Fix printf compiler warnings in wfp regress. Convert wchar to abluhm1-9/+18
2020-01-13Link forgotten libc tests to the build.bluhm2-6/+10
2020-01-13Split setjmp-fpu regress into separate tests. Use errx(3) to explainbluhm6-32/+69
2020-01-12Avoid leak in error path of PKCS5_PBE_keyivgeninoguchi1-1/+2
2020-01-11Set "Content-Type: application/ocsp-request" in ocspcheck(1)'s POSTs,sthen1-1/+2
2020-01-09Avoid leak in error path of asn1_parse2inoguchi1-17/+21
2020-01-07If the client provides a TLS certificate and the user specifies abluhm1-5/+6
2020-01-06The unveil(2) for nc -U -u -l was wrong. The server cannot unveilbluhm1-4/+23
2020-01-06When using UNIX domain sockets, always call report_sock() with thebluhm1-6/+10
2020-01-04Check CMS API return value in openssl(1) cmsinoguchi1-11/+21
2020-01-04Avoid leak in error path of dh_priv_decodeinoguchi1-1/+2
2020-01-02In ssl.h rev. 1.167 and s3_lib.c rev. 1.188, jsing@ providedschwarze1-4/+21
2020-01-02Revise SSL_CTX_get_extra_chain_certs() to match OpenSSL behaviour.jsing2-8/+23
2020-01-02Provide TLSEXT_TYPE_* aliases for TLS 1.3.jsing1-1/+10
2019-12-20drand48(3) returns values in [0.0, 1.0).tb1-3/+3
2019-12-19spelling; from bryan stensonjmc1-3/+3