summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Expand)AuthorAgeFilesLines
* document ASN1_tag2str(3); from OpenSSL commit 9e183d22schwarze2017-03-251-4/+14
* Update RFC reference for TLSEXT_TYPE_padding.jsing2017-03-251-5/+2
* Check tls1_PRF() return value in tls1_generate_master_secret().jsing2017-03-251-4/+4
* Update regress to match changes to tls1_PRF().jsing2017-03-251-10/+10
* More cleanup for tls1_PRF()/tls1_P_hash() - change the argument order ofjsing2017-03-251-46/+50
* add a helper function to print all pools #ifdef MALLOC_STATSotto2017-03-241-1/+16
* document new recallocarray diagnostic; zap a few diagnostics that shouldotto2017-03-241-8/+9
* move recallocarray to malloc.c andotto2017-03-242-19/+207
* Fewer magic numbers.jsing2017-03-181-3/+3
* t1_enc.cjsing2017-03-181-3/+2
* Update regress and remove temporary buffer to match changes in tls_PRF().jsing2017-03-181-8/+4
* Currently tls1_PRF() requires that a temporary buffer be provided, thatjsing2017-03-181-50/+32
* remove unneccessary macro;jmc2017-03-171-2/+2
* Strengthen description of recallocarray(3) behaviour, hoping that readersderaadt2017-03-171-5/+10
* Convert BUF_MEM_grow() and BUF_MEM_grow_clean() to recallocarray(),jsing2017-03-161-13/+3
* Use calloc() instead of malloc() followed by manually zeroing fields.jsing2017-03-161-6/+3
* copy /etc/services in test directoryeric2017-03-141-1/+2
* refresh the test infrastructure a bit.eric2017-03-103-90/+93
* Remove the handshake digests and related code, replacing remaining usesjsing2017-03-107-166/+45
* Switch CBB to use recallocarray() - this ensures that we do not leakjsing2017-03-101-2/+2
* First pass at cleaning up the tls1_P_hash() function - remove a pointlessjsing2017-03-101-20/+19
* Add a unit test for tls1_PRF().jsing2017-03-102-1/+257
* Make tls1_PRF() non-static so it can be regress tested.jsing2017-03-101-2/+7
* The netcat server did not print the correct TLS error message ifbluhm2017-03-091-2/+2
* remove bogus variable expansioneric2017-03-092-4/+4
* missing includeeric2017-03-091-1/+2
* Correctly handle TLS PRF with MD5+SHA1 - the secret has to be partitionedjsing2017-03-071-5/+26
* Add a test that covers a libtls client talking to a Go TLS server withjsing2017-03-071-5/+107
* Allow ciphers to be set on the TLS config.jsing2017-03-071-0/+10
* Provide support for libtls protocols and allow for protocols to be set onjsing2017-03-071-3/+47
* Add handling for errors on the TLS config and properly check/handlejsing2017-03-072-6/+23
* libtls errors are much more descriptive these days - return them directlyjsing2017-03-071-9/+8
* We no longer need to keep pointers following tls_config_set_*() calls.jsing2017-03-071-6/+3
* Some tweaks from jmc@ and describe better what recallocarray does;otto2017-03-071-7/+16
* Use an unsigned loop variable to avoid a comparison between signedbluhm2017-03-061-1/+1
* Introducing recallocarray(3), a blend of calloc(3) and reallocarray(3)otto2017-03-063-7/+147
* size is unsigned so using ==0 not <=0 when checking for buffer exhaustionmillert2017-03-061-4/+4
* Pull in a change from the bind 8 resolver that fixes a potentialmillert2017-03-061-10/+16
* Clean up and simplify the tls1_PRF() implementation now that we have ajsing2017-03-061-48/+19
* Correctly convert an SSLv2 challenge into an SSLv3/TLS client random byjsing2017-03-051-9/+27
* Provide a rolling handshake hash that commences as soon as the cipherjsing2017-03-058-54/+193
* Convert various handshake message generation functions to CBB.jsing2017-03-054-56/+113
* Add an initial regress test that covers the server-side of libssl, byjsing2017-03-053-1/+220
* Drop the second argument of dtls1_set_message_header() and make it a voidjsing2017-03-043-13/+10
* Call ssl3_handshake_write() instead of ssl3_do_write() - this was missedjsing2017-03-041-2/+2
* Treat "ERROR in STARTUP" as an actual error, rather than failing withoutjsing2017-03-041-2/+2
* Remove commented out code and fix indentation of surrounding statements.jsing2017-03-041-12/+5
* Remove handling for SSLv2.jsing2017-03-041-14/+3
* Ensure MD and key initialized before processing HMACinoguchi2017-03-032-35/+224
* fix error in Dt; from robert kleinjmc2017-03-021-3/+3