summaryrefslogtreecommitdiff
path: root/src/lib/libssl/s3_lib.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Convert legacy server to tls_key_share.jsing2022-01-071-13/+1
* Convert legacy TLS client to tls_key_share.jsing2022-01-061-23/+5
* Rename tls13_key_share to tls_key_share.jsing2022-01-051-6/+7
* Do not take the strlen() of a NULL name. Defer the CBS_init() to later.tb2021-11-021-3/+3
* Ensure SSL_set_tlsext_host_name() is given a valid hostname.jsing2021-11-011-3/+8
* Fold SSL_SESSION_INTERNAL back into SSL_SESSION.jsing2021-10-251-3/+3
* Don't leak internal->verfied_chain, clean it up in ssl3_clear and free.beck2021-10-241-1/+4
* Prepare to provide SSL_get_tlsext_status_type()tb2021-09-081-1/+10
* Dedup dtls1_dispatch_alert()/ssl3_dispatch_alert().jsing2021-07-261-2/+2
* Do a first pass clean up of SSL_METHOD.jsing2021-07-031-46/+1
* Merge SSL_METHOD_INTERNAL into SSL_METHOD.jsing2021-07-011-9/+10
* Prepare to provide SSL_get_signature_nid() and friends.jsing2021-06-301-1/+66
* Move DTLS structs/definitions/prototypes to dtls_locl.h.jsing2021-05-161-2/+3
* Explicitly include <openssl/opensslconf.h> in files using OPENSSL_NO_*jsing2021-05-161-1/+2
* Clean up TLSv1.2 certificate request handshake data.jsing2021-04-211-3/+3
* Set alpn_selected_len to zero when freeing alpn_selected.jsing2021-04-191-1/+2
* Rename new_cipher to cipher.jsing2021-03-241-2/+2
* Move the TLSv1.3 handshake struct inside the shared handshake struct.jsing2021-03-211-15/+15
* Absorb ssl3_get_algorithm2() into ssl_get_handshake_evp_md().jsing2021-02-071-15/+1
* Correct handshake MAC/PRF for various TLSv1.2 cipher suites.jsing2021-02-071-8/+8
* Rewrap a comment line to fit into 80 columns.tb2021-01-261-3/+3
* Replace SSL_IS_DTLS with SSL_is_dtls().jsing2020-10-141-5/+5
* SSL3_ENC_METHOD is just a flag word; merge it into SSL_METHOD_INTERNALguenther2020-10-111-2/+2
* Constipate ssl3_ciphers and tls1[23]_sigalgs*, pushing them intoguenther2020-10-111-2/+2
* Prepare to provide SSL_get_peer_tmp_key().jsing2020-09-171-8/+9
* Move state initialisation from SSL_clear() to ssl3_clear().jsing2020-09-141-1/+3
* Implement a rolling hash of the ClientHello message, Enforce RFC 8446beck2020-06-061-1/+3
* Use IANA allocated GOST ClientCertificateTypes.jsing2020-06-051-1/+5
* Stop sending GOST R 34.10-94 as a CertificateType.jsing2020-06-051-3/+1
* Use size_t for OCSP response length.jsing2020-05-101-4/+18
* Expose the peer ephemeral public key used for TLSv1.3 key exchange.jsing2020-04-181-32/+16
* Avoid leak for tmp.x25519inoguchi2020-02-161-1/+4
* Provide struct/functions for handling TLSv1.3 key shares.jsing2020-01-301-14/+6
* Correctly handle TLSv1.3 ciphers suites in ssl3_choose_cipher().jsing2020-01-231-2/+11
* Revise SSL_CTX_get_extra_chain_certs() to match OpenSSL behaviour.jsing2020-01-021-2/+15
* Use a valid curve when constructing an EC_KEY that looks like X25519.jsing2019-10-041-2/+3
* Provide SSL chain/cert chain APIs.jsing2019-04-041-1/+113
* Defer sigalgs selection until the certificate is known.jsing2019-03-251-1/+5
* Rename tls1_handshake_hash*() to tls1_transcript_hash*().jsing2019-02-091-3/+3
* Set pointer variables in tls13 handshake to NULL on clearbeck2019-01-241-1/+5
* Add server side of versions, keyshare, and client and server of cookiebeck2019-01-241-1/+5
* move the extensions_seen into the handshake structbeck2019-01-241-1/+3
* revert previous, accidentally contained another diff in additionbeck2019-01-231-7/+1
* Modify sigalgs extension processing for TLS 1.3.beck2019-01-231-1/+7
* Ensure we free TLS 1.3 handshake state.jsing2019-01-211-6/+11
* Add client side of supported versions and keyshare extensions with basic regressbeck2019-01-181-1/+6
* Clean up and simplify the handshake transcript code.jsing2018-11-081-6/+3
* Stop pretending that a cert member in a SSL and SSL_CTX can be NULL.jsing2018-11-081-18/+1
* Add TLSv1.3 cipher suites (with appropriate guards).jsing2018-11-071-1/+55
* Rename the TLS Supported Elliptic Curves extension to Supported Groups.jsing2018-11-051-3/+3