summaryrefslogtreecommitdiff
path: root/src (unfollow)
Commit message (Expand)AuthorFilesLines
2020-04-22Improve TLSv1.3 state machine for HelloRetryRequest handling.jsing5-66/+104
2020-04-21Handle TLSv1.3 key shares other than X25519 on the server side.jsing2-16/+34
2020-04-21Consolidate TLSv1.3 constants.jsing3-40/+47
2020-04-19Add -groups option to openssl(1) s_server.jsing2-35/+31
2020-04-19Provide TLSv1.3 cipher suite aliases to match the names used in RFC 8446.jsing1-2/+25
2020-04-18Fix wrapping/indentation.jsing1-4/+3
2020-04-18Expose the peer ephemeral public key used for TLSv1.3 key exchange.jsing5-36/+79
2020-04-18Tweak previous active cipher suite code.jsing1-6/+5
2020-04-18Allow more key share groups for TLSv1.3.jsing1-21/+12
2020-04-17Only include TLSv1.3 cipher suites if there are active cipher suites.jsing1-2/+10
2020-04-17Update key share regress to match previous change.jsing1-4/+4
2020-04-17Generate client key share using our preferred group.jsing4-25/+37
2020-04-16Remove AUTHORS section. This follows what is done in strstr.3claudio1-4/+2
2020-04-16Replace the simple memmem() implementation with a version that is O(n)claudio1-47/+167
2020-04-16Resync our strstr.c with the musl version. Removes some debug code andclaudio1-11/+3
2020-04-14Update in several respects:schwarze1-13/+11
2020-04-14add the missing sentence "LibreSSL no longer provides any suchschwarze1-2/+3
2020-04-14Delete the three sentences listing the ciphers currently includedschwarze1-15/+2
2020-04-11Document the TLSv1.3 control word, update the description of theschwarze1-4/+30
2020-04-10sync cert.pem with Mozilla's root ca list, ok beck@sthen1-276/+343
2020-04-10When printing the serialNumber, fall back to the colon separated hextb1-2/+4
2020-04-09Revise test to handle the fact that TLSv1.3 cipher suites are now beingjsing1-2/+4
2020-04-09Include TLSv1.3 cipher suites unless cipher string references TLSv1.3.jsing1-6/+19
2020-04-09Test both SSLv3 (aka pre-TLSv1.2) and TLSv1.2 cipher suites with TLS.jsing1-1/+1
2020-04-09Tidy line wrapping and remove an extra blank line.jsing1-4/+3
2020-04-09ssl_aes_is_accelerated() returns a boolean - treat it as such, rather thanjsing1-2/+2
2020-04-08Ensure legacy session ID is persistent during client TLS session.jsing1-9/+14
2020-04-06Re-enable the client test now that it passes again.jsing1-2/+2
2020-04-06Minor code improvements.jsing1-3/+3
2020-04-06Add tests that cover TLSv1.2 and disable those that trigger TLSv1.3.jsing1-3/+32
2020-04-06Zero the client random field in the TLSv1.2 golden value.jsing1-5/+5
2020-04-06Improve comparision with test data.jsing1-7/+9
2020-04-06Dump the test data when the lengths differ in order to aid debugging.jsing1-0/+3
2020-04-06Use errx() if we fail to build the client hello.jsing1-1/+1
2020-04-06Send a zero-length session identifier if TLSv1.3 is not enabled.jsing1-4/+7
2020-03-30"eventually" came and went back in 2004.libressl-v3.1.0martijn1-3/+1
2020-03-30Void functions obviously do not return values; no need to elaborate.schwarze5-31/+10
2020-03-29Void functions obviously do not return values; no need to elaborate.schwarze5-28/+10
2020-03-28Be concise: do not say that void functions return no values, that's obvious.schwarze3-22/+6
2020-03-24Fix ASN1 print functionsinoguchi1-6/+13
2020-03-23Add a test program for getopt(3) that is adequate for manual testingschwarze4-2/+174
2020-03-16Consistently spell 'unsigned' as 'unsigned int', as style(9) seemstb7-44/+45
2020-03-16Adapt to tls13_record_layer.c r1.30 (the sequence number shouldn't wrap).tb1-2/+2
2020-03-16The RFC is clear (section 5.3) that sequence number should never wrap.tb1-5/+12
2020-03-13Increment a few more sequence numbers where the carry is close totb1-1/+41
2020-03-13Remove dtls1_enc().jsing5-222/+11
2020-03-13Add regress for TLSv1.3 sequence number handling.jsing3-1/+135
2020-03-13Correct TLSv1.3 sequence number increment and wrapping check.jsing1-3/+3
2020-03-13Add missing $OpenBSD$ tag.jsing1-0/+1
2020-03-13Add regress for CBB_add_space().jsing1-1/+41