summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* In ssl_methods.c rev. 1.18, jsing@ deprecated *_server_method(3)schwarze2020-10-111-11/+18
* SSL3_ENC_METHOD is just a flag word; merge it into SSL_METHOD_INTERNALguenther2020-10-115-42/+28
* Fix an assert conditioned on DTLS1_VERSION.jsing2020-10-111-9/+4
* Grow init_buf before stashing a handshake message for the legacy stack.jsing2020-10-111-1/+3
* No longer need to cast away const in srtp_find_profile_by_name()tb2020-10-111-2/+2
* Make profile_name const in srtp_find_profile_by_name()tb2020-10-112-7/+5
* Update regress for method changes.jsing2020-10-111-4/+4
* Condense and simplify TLS methods.jsing2020-10-117-442/+73
* Unbreak regress following SRTP_PROTECTION_PROFILE const change.jsing2020-10-111-2/+2
* Constipate srtp_known_profiles, pushing it into .data.rel.roguenther2020-10-113-17/+18
* Constipate ssl3_ciphers and tls1[23]_sigalgs*, pushing them intoguenther2020-10-116-32/+32
* Don't leak bundle_file and cert_file paths at the end.tb2020-10-101-1/+3
* Fix leak or double free with OCSP_request_add0_id()tb2020-10-091-8/+9
* As noted by tb@ previous commit only removed an unused fucntion.otto2020-10-091-4/+9
* set SO_REUSEADDR on the server socket when we play oscp server.beck2020-10-081-1/+2
* A void function has no return value, so zap RETURN VALUES sectiontb2020-10-081-5/+2
* grammar fix: if/when a renegotiation takeS placetb2020-10-082-6/+6
* Read cert.pem once and reuse it instead of reading it twice per test certtb2020-10-081-18/+10
* zap trailing whitespacetb2020-10-071-21/+21
* add arguments to skip a bunch of x448 teststb2020-10-071-3/+18
* fix line wrappingtb2020-10-071-3/+2
* Hook up tlslegacy regress.jsing2020-10-071-1/+2
* Mop up various things that are now unused with the new record layer.jsing2020-10-073-32/+6
* Add regress tests for switching from the new TLS stack to the legacy stack.jsing2020-10-072-0/+642
* Include a TLS record header when switching to the legacy stack.jsing2020-10-071-9/+27
* Use std=gnu99 to be able to build the tests with both base clang and gcc.mpi2020-10-061-1/+3
* Use random value for canary bytes; ok tb@otto2020-10-061-23/+1
* Merge d1_{clnt,srvr}.c into ssl_{clnt,srvr}.cjsing2020-10-036-359/+103
* Use TLSv1_1_enc_data instead of DTLSv1_enc_data.jsing2020-10-033-11/+6
* Reimplement the TLSv1.2 record handling for the read side.jsing2020-10-036-605/+426
* Rename tls13_record_layer_alert() to tls13_record_layer_enqueue_alert()jsing2020-10-031-3/+4
* Make dtls1_copy_record() take a DTLS1_RECORD_DATA_INTERNAL *.jsing2020-10-031-10/+4
* Inline two macros that are only used in one place each.jsing2020-10-031-16/+6
* KNFtb2020-10-031-12/+11
* typotb2020-10-031-1/+1
* spelling, punctuation, whitespacetb2020-10-022-6/+6
* Add -[46] nops for compatibility with the OpenSSL s_servertb2020-10-021-1/+9
* Add possibility to link and run this test against the OpenSSL 1.1.1 packagetb2020-10-021-1/+7
* Use += and ?= and tidy up whitespacetb2020-10-021-8/+8
* Tidy up: no need to link statically against libcrypto and no needtb2020-10-021-4/+4
* Make this test compile against OpenSSL 1.1tb2020-10-021-11/+21
* Ensure leaf is set up on X509_STORE_CTX before verification.jsing2020-09-261-9/+7
* Call dtls1_hm_fragment_free() from dtls1_drain_fragments()jsing2020-09-262-8/+7
* Have dtls1_new() call dtls1_free() on failure.jsing2020-09-261-36/+22
* Have dtls1_hm_fragment_new() call dtls1_hm_fragment_free() on failure.jsing2020-09-261-26/+17
* Refactor dtls1_clear_queues()tb2020-09-261-25/+26
* jumping into the x509 fray with a bunch of whitespace repairderaadt2020-09-261-6/+6
* move test-tls13-finished.py from slow tests to normal tests.tb2020-09-251-27/+26
* bump to LibreSSL 3.2.2 ahead of lockbcook2020-09-251-3/+3
* KNF for a few comments and indent a labeltb2020-09-251-8/+12