summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Expand)AuthorAgeFilesLines
* Move unsupported, obsolete ciphers and deprecated aliases out ofschwarze2020-04-251-31/+29
* tweak the wording to make it clearer under which conditions exactlyschwarze2020-04-251-4/+4
* Revise regress to match state transition changes.jsing2020-04-221-11/+13
* Improve TLSv1.3 state machine for HelloRetryRequest handling.jsing2020-04-225-66/+104
* Handle TLSv1.3 key shares other than X25519 on the server side.jsing2020-04-212-16/+34
* Consolidate TLSv1.3 constants.jsing2020-04-213-40/+47
* Add -groups option to openssl(1) s_server.jsing2020-04-192-35/+31
* Provide TLSv1.3 cipher suite aliases to match the names used in RFC 8446.jsing2020-04-191-2/+25
* Fix wrapping/indentation.jsing2020-04-181-4/+3
* Expose the peer ephemeral public key used for TLSv1.3 key exchange.jsing2020-04-185-36/+79
* Tweak previous active cipher suite code.jsing2020-04-181-6/+5
* Allow more key share groups for TLSv1.3.jsing2020-04-181-21/+12
* Only include TLSv1.3 cipher suites if there are active cipher suites.jsing2020-04-171-2/+10
* Update key share regress to match previous change.jsing2020-04-171-4/+4
* Generate client key share using our preferred group.jsing2020-04-174-25/+37
* Remove AUTHORS section. This follows what is done in strstr.3claudio2020-04-161-4/+2
* Replace the simple memmem() implementation with a version that is O(n)claudio2020-04-161-47/+167
* Resync our strstr.c with the musl version. Removes some debug code andclaudio2020-04-161-11/+3
* Update in several respects:schwarze2020-04-141-13/+11
* add the missing sentence "LibreSSL no longer provides any suchschwarze2020-04-141-2/+3
* Delete the three sentences listing the ciphers currently includedschwarze2020-04-141-15/+2
* Document the TLSv1.3 control word, update the description of theschwarze2020-04-111-4/+30
* sync cert.pem with Mozilla's root ca list, ok beck@sthen2020-04-101-276/+343
* When printing the serialNumber, fall back to the colon separated hextb2020-04-101-2/+4
* Revise test to handle the fact that TLSv1.3 cipher suites are now beingjsing2020-04-091-2/+4
* Include TLSv1.3 cipher suites unless cipher string references TLSv1.3.jsing2020-04-091-6/+19
* Test both SSLv3 (aka pre-TLSv1.2) and TLSv1.2 cipher suites with TLS.jsing2020-04-091-1/+1
* Tidy line wrapping and remove an extra blank line.jsing2020-04-091-4/+3
* ssl_aes_is_accelerated() returns a boolean - treat it as such, rather thanjsing2020-04-091-2/+2
* Ensure legacy session ID is persistent during client TLS session.jsing2020-04-081-9/+14
* Re-enable the client test now that it passes again.jsing2020-04-061-2/+2
* Minor code improvements.jsing2020-04-061-3/+3
* Add tests that cover TLSv1.2 and disable those that trigger TLSv1.3.jsing2020-04-061-3/+32
* Zero the client random field in the TLSv1.2 golden value.jsing2020-04-061-5/+5
* Improve comparision with test data.jsing2020-04-061-7/+9
* Dump the test data when the lengths differ in order to aid debugging.jsing2020-04-061-0/+3
* Use errx() if we fail to build the client hello.jsing2020-04-061-1/+1
* Send a zero-length session identifier if TLSv1.3 is not enabled.jsing2020-04-061-4/+7
* "eventually" came and went back in 2004.libressl-v3.1.0martijn2020-03-301-3/+1
* Void functions obviously do not return values; no need to elaborate.schwarze2020-03-305-31/+10
* Void functions obviously do not return values; no need to elaborate.schwarze2020-03-295-28/+10
* Be concise: do not say that void functions return no values, that's obvious.schwarze2020-03-283-22/+6
* Fix ASN1 print functionsinoguchi2020-03-241-6/+13
* Add a test program for getopt(3) that is adequate for manual testingschwarze2020-03-234-2/+174
* Consistently spell 'unsigned' as 'unsigned int', as style(9) seemstb2020-03-167-44/+45
* Adapt to tls13_record_layer.c r1.30 (the sequence number shouldn't wrap).tb2020-03-161-2/+2
* The RFC is clear (section 5.3) that sequence number should never wrap.tb2020-03-161-5/+12
* Increment a few more sequence numbers where the carry is close totb2020-03-131-1/+41
* Remove dtls1_enc().jsing2020-03-135-222/+11
* Add regress for TLSv1.3 sequence number handling.jsing2020-03-133-1/+135