index
:
src
cvs/HEAD
kms/intel
kms/radeon
master
OpenBSD base system
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
lib
Age
Commit message (
Expand
)
Author
2020-02-06
Re-enable the TLSv1.3 client since the known issues have been addressed.
Joel Sing
2020-02-06
Add a workaround to make SSL_set_session() work with TLSv1.3.
Joel Sing
2020-02-06
Add support for handling hello retry requests in the TLSv1.3 client.
Joel Sing
2020-02-06
Correctly handle key share extensions in a hello retry request.
Joel Sing
2020-02-06
Instead of opting in to futexes on archs with atomics opt out on archs
Jonathan Gray
2020-02-05
Refactor the server hello processing code in the TLSv1.3 client.
Joel Sing
2020-02-05
Remove the hello retry request processing code that was previously added.
Joel Sing
2020-02-05
Provide tls1_transcript_unfreeze() to avoid the need for manual flags
Joel Sing
2020-02-05
Pull the handshake message transcript code into its own function.
Joel Sing
2020-02-05
More precision regarding the openlog(3) *ident argument;
Ingo Schwarze
2020-02-05
Mention AUDIO_MIXER_{DEVINFO,READ,WRITE} in the "audio" section
Alexandre Ratchov
2020-02-05
Rework tls13_legacy_handshake_message_{recv,sent}_cb() to use
Theo Buehler
2020-02-04
Add support for TLSv1.3 key shares with secp256r1 and secp384r1 groups.
Joel Sing
2020-02-04
Free the transcript as soon as we initialise the transcript hash.
Joel Sing
2020-02-01
Correctly unpack client key shares.
Joel Sing
2020-02-01
Disable TLSv1.3 client while some known issues are being addressed.
Joel Sing
2020-01-30
Provide struct/functions for handling TLSv1.3 key shares.
Joel Sing
2020-01-30
Factor out/rewrite the ECDHE EC point key exchange code.
Joel Sing
2020-01-29
Remove dead prototypes.
Joel Sing
2020-01-29
If the TLSv1.3 code has not recorded an error and something already exists
Joel Sing
2020-01-29
Remove unused stub implementation of tls13_accept(). The correct
Theo Buehler
2020-01-26
Fix SSL_CIPHER_description
Kinichiro Inoguchi
2020-01-26
Avoid 32 bit right shift with unsigned int in crypto/cast/cast_lcl.h
Kinichiro Inoguchi
2020-01-26
tweak previous; ok tb
Jason McIntyre
2020-01-26
typo
Theo Buehler
2020-01-26
Document the change in EVP_chacha20(3).
Theo Buehler
2020-01-26
Improve the comment explaining why the previous change matches OpenSSL's
Theo Buehler
2020-01-26
When an SSL method is set, bump the max version back to that of the
Joel Sing
2020-01-26
When switching back to a legacy client or server, ensure we reset the
Joel Sing
2020-01-26
Fix basement bug where record layer would not correctly deal with
Bob Beck
2020-01-26
Add server side support for requesting client certificates in tls 1.3
Bob Beck
2020-01-26
Add client certificate support for tls 1.3
Bob Beck
2020-01-26
Add sigalgs for server side to enable client certificate processing
Bob Beck
2020-01-26
Move pad and verify context into tls13_lib.c
Bob Beck
2020-01-26
Adjust EVP_chacha20()'s behavior to match OpenSSL's semantics:
Theo Buehler
2020-01-26
Insert two nop instructions after each svc #0 instruction in userland.
Mark Kettenis
2020-01-25
Add an underbar for consistency.
Theo Buehler
2020-01-25
Revert change to certificate request check from r1.45.
Joel Sing
2020-01-25
Only perform the downgrade check if our max version is less than TLSv1.3.
Joel Sing
2020-01-25
Preserve the transcript hash for the client finished message,
Bob Beck
2020-01-25
Support legacy message callbacks. First step for SSL_set_msg_callback(3)
Theo Buehler
2020-01-25
Correct value for SSL_TLSEXT_MSG_HRR.
Joel Sing
2020-01-25
Only discard the extension block for client hello and server hello
Joel Sing
2020-01-25
Only send an RI extension for pre-TLSv1.3 versions.
Joel Sing
2020-01-25
It is possible to receive a pre-TLSv1.3 alert in response to a TLSv1.3
Joel Sing
2020-01-25
Correct backwards test so that we may accept a certificate requst
Bob Beck
2020-01-24
Document `kern.allowdt' button.
Martin Pieuchot
2020-01-24
Complete the initial TLSv1.3 implementation.
Joel Sing
2020-01-24
Preserve the TLS transcript at additional points.
Joel Sing
2020-01-24
Permit 0 length writes, because openssl s_client is special
Bob Beck
[next]