summaryrefslogtreecommitdiff
path: root/src/lib/libssl/s3_lib.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Prepare to provide SSL_get_tlsext_status_type()tb2021-09-081-1/+10
* Dedup dtls1_dispatch_alert()/ssl3_dispatch_alert().jsing2021-07-261-2/+2
* Do a first pass clean up of SSL_METHOD.jsing2021-07-031-46/+1
* Merge SSL_METHOD_INTERNAL into SSL_METHOD.jsing2021-07-011-9/+10
* Prepare to provide SSL_get_signature_nid() and friends.jsing2021-06-301-1/+66
* Move DTLS structs/definitions/prototypes to dtls_locl.h.jsing2021-05-161-2/+3
* Explicitly include <openssl/opensslconf.h> in files using OPENSSL_NO_*jsing2021-05-161-1/+2
* Clean up TLSv1.2 certificate request handshake data.jsing2021-04-211-3/+3
* Set alpn_selected_len to zero when freeing alpn_selected.jsing2021-04-191-1/+2
* Rename new_cipher to cipher.jsing2021-03-241-2/+2
* Move the TLSv1.3 handshake struct inside the shared handshake struct.jsing2021-03-211-15/+15
* Absorb ssl3_get_algorithm2() into ssl_get_handshake_evp_md().jsing2021-02-071-15/+1
* Correct handshake MAC/PRF for various TLSv1.2 cipher suites.jsing2021-02-071-8/+8
* Rewrap a comment line to fit into 80 columns.tb2021-01-261-3/+3
* Replace SSL_IS_DTLS with SSL_is_dtls().jsing2020-10-141-5/+5
* SSL3_ENC_METHOD is just a flag word; merge it into SSL_METHOD_INTERNALguenther2020-10-111-2/+2
* Constipate ssl3_ciphers and tls1[23]_sigalgs*, pushing them intoguenther2020-10-111-2/+2
* Prepare to provide SSL_get_peer_tmp_key().jsing2020-09-171-8/+9
* Move state initialisation from SSL_clear() to ssl3_clear().jsing2020-09-141-1/+3
* Implement a rolling hash of the ClientHello message, Enforce RFC 8446beck2020-06-061-1/+3
* Use IANA allocated GOST ClientCertificateTypes.jsing2020-06-051-1/+5
* Stop sending GOST R 34.10-94 as a CertificateType.jsing2020-06-051-3/+1
* Use size_t for OCSP response length.jsing2020-05-101-4/+18
* Expose the peer ephemeral public key used for TLSv1.3 key exchange.jsing2020-04-181-32/+16
* Avoid leak for tmp.x25519inoguchi2020-02-161-1/+4
* Provide struct/functions for handling TLSv1.3 key shares.jsing2020-01-301-14/+6
* Correctly handle TLSv1.3 ciphers suites in ssl3_choose_cipher().jsing2020-01-231-2/+11
* Revise SSL_CTX_get_extra_chain_certs() to match OpenSSL behaviour.jsing2020-01-021-2/+15
* Use a valid curve when constructing an EC_KEY that looks like X25519.jsing2019-10-041-2/+3
* Provide SSL chain/cert chain APIs.jsing2019-04-041-1/+113
* Defer sigalgs selection until the certificate is known.jsing2019-03-251-1/+5
* Rename tls1_handshake_hash*() to tls1_transcript_hash*().jsing2019-02-091-3/+3
* Set pointer variables in tls13 handshake to NULL on clearbeck2019-01-241-1/+5
* Add server side of versions, keyshare, and client and server of cookiebeck2019-01-241-1/+5
* move the extensions_seen into the handshake structbeck2019-01-241-1/+3
* revert previous, accidentally contained another diff in additionbeck2019-01-231-7/+1
* Modify sigalgs extension processing for TLS 1.3.beck2019-01-231-1/+7
* Ensure we free TLS 1.3 handshake state.jsing2019-01-211-6/+11
* Add client side of supported versions and keyshare extensions with basic regressbeck2019-01-181-1/+6
* Clean up and simplify the handshake transcript code.jsing2018-11-081-6/+3
* Stop pretending that a cert member in a SSL and SSL_CTX can be NULL.jsing2018-11-081-18/+1
* Add TLSv1.3 cipher suites (with appropriate guards).jsing2018-11-071-1/+55
* Rename the TLS Supported Elliptic Curves extension to Supported Groups.jsing2018-11-051-3/+3
* Clean up the code that checks if we can choose an EC cipher suite.jsing2018-11-051-2/+5
* Make more of libssl's record layer state internal.jsing2018-10-241-14/+14
* Drop SSL_CIPHER_ALGORITHM2_AEAD flag.jsing2018-09-061-14/+14
* Add some missing statics.jsing2018-08-271-3/+3
* Clean up handshake message start/finish functions.jsing2018-08-241-39/+3
* Remove the three remaining single DES cipher suites.jsing2018-06-021-49/+1
* Nuke SSL3_FLAGS_DELAY_CLIENT_FINISHED and SSL3_FLAGS_POP_BUFFER.jsing2018-04-071-47/+4