summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Expand)AuthorAgeFilesLines
* Convert the SSL/TLS record creation code to CBB.jsing2020-02-211-18/+28
* Convert the DTLS header creation code to CBB.jsing2020-02-211-20/+27
* Remove some commented code, remove some pointless comments and move somejsing2020-02-211-17/+6
* Convert dtls1_build_sequence_number() to CBB.jsing2020-02-211-7/+15
* Move l2n/l2n8 into s3_cbc.c, since this is the only code that uses it.jsing2020-02-212-16/+16
* Remove prefix_len, since it is always zero.jsing2020-02-211-4/+3
* Remove now unused variable.jsing2020-02-211-3/+1
* Tag subcommand sectionskn2020-02-191-2/+44
* Refactor do_ssl3_write().jsing2020-02-191-97/+98
* drop unused include <openssl/curve25519.h>tb2020-02-184-10/+4
* Describe the restriction for length of openssl conf value stringinoguchi2020-02-171-2/+4
* Restrict the length of openssl conf value stringinoguchi2020-02-173-5/+14
* Update protocol version test to include TLSv1.3.jsing2020-02-162-0/+3
* Add -tls1_3 and -notls1_3 options to openssl(1) s_client.jsing2020-02-162-23/+37
* Avoid potential NULL dereference when parsing a server keyshare extension.jsing2020-02-161-1/+4
* Avoid leak for tmp.x25519inoguchi2020-02-162-5/+11
* Move the TLSv1.3 code that interfaces with the legacy APIs/stack into ajsing2020-02-153-309/+330
* Remove #include that is not needed.jsing2020-02-151-3/+1
* no need to declare "extern optarg" and "extern optind"schwarze2020-02-143-9/+3
* Standardize argument naming for "sourceaddr" and unify the wording a bit,schwarze2020-02-122-10/+9
* correct Research Unix edition "appeared in" use in HISTORYjsg2020-02-081-3/+3
* Re-enable the TLSv1.3 client since the known issues have been addressed.jsing2020-02-061-3/+1
* Add a workaround to make SSL_set_session() work with TLSv1.3.jsing2020-02-061-1/+9
* Add support for handling hello retry requests in the TLSv1.3 client.jsing2020-02-061-5/+100
* Correctly handle key share extensions in a hello retry request.jsing2020-02-062-4/+11
* Reset the key share so that we do not have an existing peer public key.jsing2020-02-051-1/+7
* Refactor the server hello processing code in the TLSv1.3 client.jsing2020-02-052-22/+46
* Remove the hello retry request processing code that was previously added.jsing2020-02-052-65/+16
* Provide tls1_transcript_unfreeze() to avoid the need for manual flagsjsing2020-02-052-3/+10
* Pull the handshake message transcript code into its own function.jsing2020-02-052-7/+14
* Rework tls13_legacy_handshake_message_{recv,sent}_cb() to usetb2020-02-053-16/+22
* Add support for TLSv1.3 key shares with secp256r1 and secp384r1 groups.jsing2020-02-041-5/+98
* Free the transcript as soon as we initialise the transcript hash.jsing2020-02-042-2/+4
* Add missing new line to printf. Make clean should not require SUDO.bluhm2020-02-022-7/+5
* Tweak regress to match change made to tls13_key_share_peer_public().jsing2020-02-011-2/+1
* Correctly unpack client key shares.jsing2020-02-012-14/+11
* Disable TLSv1.3 client while some known issues are being addressed.jsing2020-02-011-1/+3
* Revise for TLSv1.3 key share changes.jsing2020-01-301-8/+27
* Provide struct/functions for handling TLSv1.3 key shares.jsing2020-01-308-130/+299
* Factor out/rewrite the ECDHE EC point key exchange code.jsing2020-01-305-173/+188
* Enable t_ptrace with an errno change compared to NetBSD.mpi2020-01-304-19/+31
* Remove dead prototypes.jsing2020-01-291-10/+1
* If the TLSv1.3 code has not recorded an error and something already existsjsing2020-01-293-3/+9
* Remove unused stub implementation of tls13_accept(). The correcttb2020-01-291-11/+1
* Some of the test vectors that were added in the upstream committb2020-01-271-7/+9
* revert previous nc loop refactor from 1.211, breaks bluhm's stuffbeck2020-01-261-64/+36
* Fix SSL_CIPHER_descriptioninoguchi2020-01-261-2/+2
* Restrict to use up to TLSv1.2 for test_server_client in appstest.shinoguchi2020-01-261-7/+7
* Avoid 32 bit right shift with unsigned int in crypto/cast/cast_lcl.hinoguchi2020-01-261-2/+2
* tweak previous; ok tbjmc2020-01-261-3/+3