summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Expand)AuthorAgeFilesLines
* Update regress to match TLS versions change.jsing2021-02-251-6/+6
* Only use TLS versions internally (rather than both TLS and DTLS versions).jsing2021-02-259-128/+132
* Rename depth to num_untrusted so it identifies what it actually represents.jsing2021-02-251-6/+6
* Avoid passing last and depth to x509_verify_cert_error() on ENOMEM.jsing2021-02-251-3/+2
* - Make use of the fact that we know how the chunks are aligned, andotto2021-02-252-49/+83
* Fix comment explaining last_untrusted. This should really be calledtb2021-02-241-2/+2
* Make the new validator check for EXFLAG_CRITICALtb2021-02-241-8/+15
* Make this test module aware so it passes with Go 1.16tb2021-02-232-0/+8
* Fix bizarre punctuation and capitalization in a comment.tb2021-02-221-2/+2
* Simplify version checks in the TLSv1.3 clienttb2021-02-221-22/+10
* Factor out/change some of the legacy client version handling code.jsing2021-02-223-12/+36
* ugly whitespacetb2021-02-202-14/+14
* Rename f_err into fatal_err.tb2021-02-207-183/+183
* Rename the truncated label into decode_err. This describes its purposetb2021-02-202-73/+73
* Revise regress to match change in SSL{_CTX,}_get_{min,max}_proto_version().jsing2021-02-201-34/+45
* Return a min/max version of zero if set to zero.jsing2021-02-203-17/+41
* Add DTLSv1.2 methods.jsing2021-02-202-3/+159
* Handle DTLS1_2_VERSION in various places.jsing2021-02-203-6/+9
* Revise HelloVerifyRequest handling for DTLSv1.2.jsing2021-02-202-4/+14
* Group HelloVerifyRequest decoding and add missing check for trailing data.jsing2021-02-201-4/+5
* Add various public DTLS related defines.jsing2021-02-202-2/+14
* Clean up/simplify dtls1_get_cipher().jsing2021-02-201-7/+8
* Pull in fix for EVP_CipherUpdate() overflow from OpenSSL.tb2021-02-181-1/+23
* mark test-inlabel-wildcard-cert-no-CA-client as an expected failuretb2021-02-181-1/+2
* Add x509 certificate validation regression testsjan2021-02-163-2/+242
* Only print the certificate file once on verifification failure.jsing2021-02-151-4/+2
* Some people still argue that rand(3) and random(3) have suitable deterministicderaadt2021-02-122-4/+10
* Sync cert.pem with Mozilla NSS root CAs, except "GeoTrust Global CA", ok tb@sthen2021-02-121-659/+417
* A few more flag combo's to testotto2021-02-121-2/+14
* KNFtb2021-02-111-4/+7
* Walk over all results from getaddrinfo() instead of giving up after theclaudio2021-02-091-2/+1
* Update DTLS client hello due to ECC changes.jsing2021-02-081-5/+8
* Remove bogus DTLS checks to disable ECC and OCSP.jsing2021-02-082-10/+3
* Enforce read ahead with DTLS.jsing2021-02-081-5/+5
* Use dtls1_retrieve_buffered_record() to load buffered application data.jsing2021-02-081-11/+3
* Absorb ssl3_get_algorithm2() into ssl_get_handshake_evp_md().jsing2021-02-074-22/+19
* Correct handshake MAC/PRF for various TLSv1.2 cipher suites.jsing2021-02-071-8/+8
* Factor out the legacy stack version checks.jsing2021-02-074-28/+24
* Enable auto DHE and disable session tickets for some tests.jsing2021-02-071-12/+13
* Only hexdump packets/messages on higher debug levels.jsing2021-02-061-3/+4
* Test reads and writes between the client and server.jsing2021-02-061-3/+49
* Fail early in legacy exporter if master secret is not availabletb2021-02-031-1/+6
* Add OID for draft-ietf-opsawg-finding-geofeedsjob2021-02-032-0/+2
* Add a bunch of RPKI OIDsjob2021-02-022-1/+26
* Use "EC/RSA key setup failure" to align error with otherstb2021-02-011-3/+3
* missing word in commenttb2021-01-301-3/+3
* Remove direct assignment of aead_ctx.jsing2021-01-281-13/+7
* Move AEAD handling into the new TLSv1.2 record layer.jsing2021-01-284-134/+102
* wrap an overlong linetb2021-01-271-2/+3
* Link SSL_get_finished.3 to build.tb2021-01-271-1/+2