summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Expand)AuthorAgeFilesLines
* Clean up some pesky trailing whitespace.jsing2019-02-131-10/+10
* Handle finished messages in TLSv1.3 client.jsing2019-02-132-14/+131
* New futex(2) based rwlock implementation based on the mutex code.mpi2019-02-131-1/+12
* Xr the byteorder funcs; from tim kuijstenjmc2019-02-131-3/+4
* Implement handling of Certificate and CertificateVerify messages.jsing2019-02-112-31/+214
* getopt(3) returns int, not char. Fix type of ch variable to preventbluhm2019-02-112-6/+6
* "non-existant" is one of those words that don't exist, so use "non-existent"phessler2019-02-101-2/+2
* Preserve the transcript hash at specific stages of the TLSv1.3 handshake.jsing2019-02-102-2/+16
* Fix weird wrap showing cipher list in interactive modeinoguchi2019-02-096-13/+23
* Rename the file that contains the transcript handling code.jsing2019-02-092-3/+3
* Rename tls1_handshake_hash*() to tls1_transcript_hash*().jsing2019-02-097-29/+29
* Provide a reference from the TLSv1.3 context to the handshake state.jsing2019-02-092-19/+25
* Summarize the 4 same name functions and move it to apps.cinoguchi2019-02-097-72/+26
* Implement processing of EncryptedExtensions in the TLS 1.3 client.jsing2019-02-072-8/+28
* Add islower check to show_ciphers in pkey.c and rsa.c.inoguchi2019-02-052-2/+10
* Convert openssl(1) pkey to the newer style of option handling.inoguchi2019-02-051-96/+171
* Implement parsing and processing of TLSv1.3 ServerHello messages.jsing2019-02-043-11/+187
* Make it easier to build with LIBRESSL_HAS_TLS1_3 enabled.jsing2019-02-041-1/+4
* Document missing command line options for the rsautl command.tb2019-02-042-9/+16
* zap spaces before tabstb2019-02-031-5/+5
* Convert openssl(1) rsautl to the newer style of option handling.jsing2019-02-031-121/+196
* Revert r1.38 as it introduces use of a stack value post function return.jsing2019-02-031-50/+86
* Use malloc() and memcpy() the test X25519 x25519_peer_public value.jsing2019-02-031-3/+6
* unwrap a line introduced in previous.tb2019-01-311-3/+2
* Correct handling of TLS sigalgs extension for TLSv1.0/TLSv1.1.jsing2019-01-301-33/+19
* instead of calling abort() for 3 "must not use anymore" interfaces,deraadt2019-01-291-7/+4
* Remove SSLv23 padding mode from rsautl's usage (left behind in a removaltb2019-01-291-2/+1
* spelling;jmc2019-01-281-3/+3
* Deduplicate a bunch of replicated code in the extension handlingbeck2019-01-281-86/+50
* Add tls_extension_seen(), a utility to know if a particular extensionbeck2019-01-282-9/+15
* zap a commented out line. 0RTT will need more thought thantb2019-01-271-2/+1
* refactor and clean up the code generating dot output.tb2019-01-271-53/+76
* Recent discussions about abort() potentially leaving key material inderaadt2019-01-261-5/+8
* print errors to stderrtb2019-01-251-19/+21
* sort output suffixestb2019-01-251-2/+2
* I am retiring my old email address; replace it with my OpenBSD one.millert2019-01-2527-61/+61
* Add code to visualize the state machine. Both the state machine and thetb2019-01-242-5/+79
* Set pointer variables in tls13 handshake to NULL on clearbeck2019-01-241-1/+5
* set the NEGOTIATED flag in the flags argument rather thantb2019-01-241-4/+4
* Add server side of versions, keyshare, and client and server of cookiebeck2019-01-245-28/+742
* move the extensions_seen into the handshake structbeck2019-01-243-6/+12
* Remove SHA224 based sigalgs from use in TLS 1.2 as SHA224 is deprecated.beck2019-01-243-37/+22
* Correct ECDSA_SECP512R1 typo to ECDSA_SECP521R1beck2019-01-232-6/+6
* make whitespace inside curlies consistent; sort function prototypes.tb2019-01-231-24/+24
* Rename NUM_HANDSHAKE to handshake_count and make it a variabletb2019-01-233-13/+47
* assert.h is often misused. It should not be used in a librarybeck2019-01-232-8/+5
* Modify sigalgs extension processing to accomodate TLS 1.3.beck2019-01-238-40/+93
* revert previous, accidentally contained another diff in additionbeck2019-01-2310-408/+61
* Modify sigalgs extension processing for TLS 1.3.beck2019-01-2310-61/+408
* Sync the handshakes table with the generated table in regress.tb2019-01-231-19/+19