summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Expand)AuthorAgeFilesLines
* Refactor the server hello processing code in the TLSv1.3 client.jsing2020-02-052-22/+46
* Remove the hello retry request processing code that was previously added.jsing2020-02-052-65/+16
* Provide tls1_transcript_unfreeze() to avoid the need for manual flagsjsing2020-02-052-3/+10
* Pull the handshake message transcript code into its own function.jsing2020-02-052-7/+14
* Rework tls13_legacy_handshake_message_{recv,sent}_cb() to usetb2020-02-053-16/+22
* Add support for TLSv1.3 key shares with secp256r1 and secp384r1 groups.jsing2020-02-041-5/+98
* Free the transcript as soon as we initialise the transcript hash.jsing2020-02-042-2/+4
* Add missing new line to printf. Make clean should not require SUDO.bluhm2020-02-022-7/+5
* Tweak regress to match change made to tls13_key_share_peer_public().jsing2020-02-011-2/+1
* Correctly unpack client key shares.jsing2020-02-012-14/+11
* Disable TLSv1.3 client while some known issues are being addressed.jsing2020-02-011-1/+3
* Revise for TLSv1.3 key share changes.jsing2020-01-301-8/+27
* Provide struct/functions for handling TLSv1.3 key shares.jsing2020-01-308-130/+299
* Factor out/rewrite the ECDHE EC point key exchange code.jsing2020-01-305-173/+188
* Enable t_ptrace with an errno change compared to NetBSD.mpi2020-01-304-19/+31
* Remove dead prototypes.jsing2020-01-291-10/+1
* If the TLSv1.3 code has not recorded an error and something already existsjsing2020-01-293-3/+9
* Remove unused stub implementation of tls13_accept(). The correcttb2020-01-291-11/+1
* Some of the test vectors that were added in the upstream committb2020-01-271-7/+9
* revert previous nc loop refactor from 1.211, breaks bluhm's stuffbeck2020-01-261-64/+36
* Fix SSL_CIPHER_descriptioninoguchi2020-01-261-2/+2
* Restrict to use up to TLSv1.2 for test_server_client in appstest.shinoguchi2020-01-261-7/+7
* Avoid 32 bit right shift with unsigned int in crypto/cast/cast_lcl.hinoguchi2020-01-261-2/+2
* tweak previous; ok tbjmc2020-01-261-3/+3
* typotb2020-01-261-2/+2
* Document the change in EVP_chacha20(3).tb2020-01-261-3/+5
* Improve the comment explaining why the previous change matches OpenSSL'stb2020-01-261-8/+15
* When an SSL method is set, bump the max version back to that of thejsing2020-01-261-1/+10
* When switching back to a legacy client or server, ensure we reset thejsing2020-01-262-2/+4
* Fix basement bug where record layer would not correctly deal withbeck2020-01-261-1/+4
* Add server side support for requesting client certificates in tls 1.3beck2020-01-261-4/+173
* Add client certificate support for tls 1.3beck2020-01-262-15/+149
* Add back the tests that were deleted in previous but not containedtb2020-01-261-1/+9
* Add sigalgs for server side to enable client certificate processingbeck2020-01-261-5/+34
* server sigalgs test is now bogus, disable for nowbeck2020-01-261-2/+3
* Adjust tests to match the change in EVP_chacha20().tb2020-01-262-11/+22
* Move pad and verify context into tls13_lib.cbeck2020-01-264-68/+60
* Adjust EVP_chacha20()'s behavior to match OpenSSL's semantics:tb2020-01-261-7/+14
* Add an underbar for consistency.tb2020-01-251-2/+2
* Disable cert interop tests for now.jsing2020-01-251-2/+2
* Actually disable cipher interop tests.jsing2020-01-251-3/+3
* Disable the cipher interop tests.jsing2020-01-251-3/+4
* Accept both TLSv1.2 and TLSv1.3 protocols for netcat.jsing2020-01-251-4/+3
* Disable session regress for libressl client talking to openssl11 server.jsing2020-01-251-1/+2
* Revert change to certificate request check from r1.45.jsing2020-01-251-3/+3
* Only perform the downgrade check if our max version is less than TLSv1.3.jsing2020-01-251-15/+17
* Preserve the transcript hash for the client finished message,beck2020-01-251-2/+3
* Support legacy message callbacks. First step for SSL_set_msg_callback(3)tb2020-01-253-3/+40
* Correct value for SSL_TLSEXT_MSG_HRR.jsing2020-01-251-2/+2
* Only discard the extension block for client hello and server hellojsing2020-01-251-2/+3