summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Expand)AuthorAgeFilesLines
* Refactor do_ssl3_write().jsing2020-02-191-97/+98
* drop unused include <openssl/curve25519.h>tb2020-02-184-10/+4
* Describe the restriction for length of openssl conf value stringinoguchi2020-02-171-2/+4
* Restrict the length of openssl conf value stringinoguchi2020-02-173-5/+14
* Update protocol version test to include TLSv1.3.jsing2020-02-162-0/+3
* Add -tls1_3 and -notls1_3 options to openssl(1) s_client.jsing2020-02-162-23/+37
* Avoid potential NULL dereference when parsing a server keyshare extension.jsing2020-02-161-1/+4
* Avoid leak for tmp.x25519inoguchi2020-02-162-5/+11
* Move the TLSv1.3 code that interfaces with the legacy APIs/stack into ajsing2020-02-153-309/+330
* Remove #include that is not needed.jsing2020-02-151-3/+1
* no need to declare "extern optarg" and "extern optind"schwarze2020-02-143-9/+3
* Standardize argument naming for "sourceaddr" and unify the wording a bit,schwarze2020-02-122-10/+9
* correct Research Unix edition "appeared in" use in HISTORYjsg2020-02-081-3/+3
* Re-enable the TLSv1.3 client since the known issues have been addressed.jsing2020-02-061-3/+1
* Add a workaround to make SSL_set_session() work with TLSv1.3.jsing2020-02-061-1/+9
* Add support for handling hello retry requests in the TLSv1.3 client.jsing2020-02-061-5/+100
* Correctly handle key share extensions in a hello retry request.jsing2020-02-062-4/+11
* Reset the key share so that we do not have an existing peer public key.jsing2020-02-051-1/+7
* Refactor the server hello processing code in the TLSv1.3 client.jsing2020-02-052-22/+46
* Remove the hello retry request processing code that was previously added.jsing2020-02-052-65/+16
* Provide tls1_transcript_unfreeze() to avoid the need for manual flagsjsing2020-02-052-3/+10
* Pull the handshake message transcript code into its own function.jsing2020-02-052-7/+14
* Rework tls13_legacy_handshake_message_{recv,sent}_cb() to usetb2020-02-053-16/+22
* Add support for TLSv1.3 key shares with secp256r1 and secp384r1 groups.jsing2020-02-041-5/+98
* Free the transcript as soon as we initialise the transcript hash.jsing2020-02-042-2/+4
* Add missing new line to printf. Make clean should not require SUDO.bluhm2020-02-022-7/+5
* Tweak regress to match change made to tls13_key_share_peer_public().jsing2020-02-011-2/+1
* Correctly unpack client key shares.jsing2020-02-012-14/+11
* Disable TLSv1.3 client while some known issues are being addressed.jsing2020-02-011-1/+3
* Revise for TLSv1.3 key share changes.jsing2020-01-301-8/+27
* Provide struct/functions for handling TLSv1.3 key shares.jsing2020-01-308-130/+299
* Factor out/rewrite the ECDHE EC point key exchange code.jsing2020-01-305-173/+188
* Enable t_ptrace with an errno change compared to NetBSD.mpi2020-01-304-19/+31
* Remove dead prototypes.jsing2020-01-291-10/+1
* If the TLSv1.3 code has not recorded an error and something already existsjsing2020-01-293-3/+9
* Remove unused stub implementation of tls13_accept(). The correcttb2020-01-291-11/+1
* Some of the test vectors that were added in the upstream committb2020-01-271-7/+9
* revert previous nc loop refactor from 1.211, breaks bluhm's stuffbeck2020-01-261-64/+36
* Fix SSL_CIPHER_descriptioninoguchi2020-01-261-2/+2
* Restrict to use up to TLSv1.2 for test_server_client in appstest.shinoguchi2020-01-261-7/+7
* Avoid 32 bit right shift with unsigned int in crypto/cast/cast_lcl.hinoguchi2020-01-261-2/+2
* tweak previous; ok tbjmc2020-01-261-3/+3
* typotb2020-01-261-2/+2
* Document the change in EVP_chacha20(3).tb2020-01-261-3/+5
* Improve the comment explaining why the previous change matches OpenSSL'stb2020-01-261-8/+15
* When an SSL method is set, bump the max version back to that of thejsing2020-01-261-1/+10
* When switching back to a legacy client or server, ensure we reset thejsing2020-01-262-2/+4
* Fix basement bug where record layer would not correctly deal withbeck2020-01-261-1/+4
* Add server side support for requesting client certificates in tls 1.3beck2020-01-261-4/+173
* Add client certificate support for tls 1.3beck2020-01-262-15/+149