summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Remove SSLv23 padding mode from rsautl's usage (left behind in a removaltb2019-01-291-2/+1
* spelling;jmc2019-01-281-3/+3
* Deduplicate a bunch of replicated code in the extension handlingbeck2019-01-281-86/+50
* Add tls_extension_seen(), a utility to know if a particular extensionbeck2019-01-282-9/+15
* zap a commented out line. 0RTT will need more thought thantb2019-01-271-2/+1
* refactor and clean up the code generating dot output.tb2019-01-271-53/+76
* Recent discussions about abort() potentially leaving key material inderaadt2019-01-261-5/+8
* print errors to stderrtb2019-01-251-19/+21
* sort output suffixestb2019-01-251-2/+2
* I am retiring my old email address; replace it with my OpenBSD one.millert2019-01-2527-61/+61
* Add code to visualize the state machine. Both the state machine and thetb2019-01-242-5/+79
* Set pointer variables in tls13 handshake to NULL on clearbeck2019-01-241-1/+5
* set the NEGOTIATED flag in the flags argument rather thantb2019-01-241-4/+4
* Add server side of versions, keyshare, and client and server of cookiebeck2019-01-245-28/+742
* move the extensions_seen into the handshake structbeck2019-01-243-6/+12
* Remove SHA224 based sigalgs from use in TLS 1.2 as SHA224 is deprecated.beck2019-01-243-37/+22
* Correct ECDSA_SECP512R1 typo to ECDSA_SECP521R1beck2019-01-232-6/+6
* make whitespace inside curlies consistent; sort function prototypes.tb2019-01-231-24/+24
* Rename NUM_HANDSHAKE to handshake_count and make it a variabletb2019-01-233-13/+47
* assert.h is often misused. It should not be used in a librarybeck2019-01-232-8/+5
* Modify sigalgs extension processing to accomodate TLS 1.3.beck2019-01-238-40/+93
* revert previous, accidentally contained another diff in additionbeck2019-01-2310-408/+61
* Modify sigalgs extension processing for TLS 1.3.beck2019-01-2310-61/+408
* Sync the handshakes table with the generated table in regress.tb2019-01-231-19/+19
* incorrrect spellingtb2019-01-231-2/+2
* do not print the command in the print: targettb2019-01-231-2/+2
* Add a regression test that builds up the handshake state tabletb2019-01-232-1/+399
* Remove static from handshakes[][] so it is visible from regress/tb2019-01-231-2/+2
* No need to include <bsd.prog.mk> here.tb2019-01-232-4/+2
* sort sections, and add a missing verb to the EXAMPLES text;jmc2019-01-221-24/+24
* Wrap long lineotto2019-01-221-4/+4
* bump minors after symbol additiontb2019-01-223-3/+3
* Document SSL_get1_supported_ciphers(3) and SSL_get_client_ciphers(3).tb2019-01-221-7/+61
* Add a re-implementation of SSL_get1_supported_ciphers().tb2019-01-223-2/+38
* Provide SSL_get_client_ciphers().tb2019-01-223-2/+12
* Add missing symbols from the EC_KEY_METHOD port.tb2019-01-221-0/+8
* add support for xchacha20 and xchacha20-poly1305dlg2019-01-2210-11/+399
* lenght -> lengthjsg2019-01-212-3/+3
* a few tweakstedu2019-01-211-5/+9
* Add example showing a proper comparison function, as many examples showotto2019-01-211-3/+40
* Use the actual handshake message type in the certificate request handler.jsing2019-01-211-4/+2
* Move ssl_cipher_list_to_bytes() and ssl_bytes_to_cipher_list() totb2019-01-212-116/+120
* Provide the initial TLSv1.3 client implementation.jsing2019-01-215-25/+192
* Wire up the handshake message send and recv actions.jsing2019-01-212-4/+44
* In ssl_lib.c rev. 1.197, jsing@ added TLSv1.3 support to SSL_get_version(3).schwarze2019-01-211-2/+4
* The main handshake loop can be shared between client and server.jsing2019-01-212-29/+15
* Use ssl_cipher_is_permitted() in ssl_cipher_list_to_bytes().tb2019-01-211-9/+6
* Add ssl_cipher_is_permitted(), an internal helper function thattb2019-01-213-2/+49
* Correct some rwstate handling that I broke when refactoring.jsing2019-01-211-3/+13
* Provide TLS 1.3 cipher AEAD/hash and legacy I/O handling functions.jsing2019-01-213-2/+210