summaryrefslogtreecommitdiff
path: root/src/lib/libssl/s3_lib.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Convert ssl3_cipher_by_id() to bsearch()tb2023-11-291-8/+17
* Use a long for id in ssl3_get_cipher_by_id()tb2023-11-291-2/+2
* Hide all public symbols in libsslbeck2023-07-081-1/+17
* Disable TLS 1.0 and TLS 1.1 in libsslbeck2023-07-021-2/+2
* Move verified_chain from SSL to SSL_HANDSHAKEtb2023-05-261-5/+4
* add missing pointer invalidationjcs2023-05-161-1/+2
* Make internal header file names consistenttb2022-11-261-3/+3
* Convert the legacy TLS stack to tls_content.jsing2022-11-111-4/+11
* Use tls_buffer for alert and handshake fragments in the legacy stack.jsing2022-11-101-1/+9
* Get rid of SSL_CTX_INTERNAL and SSL_INTERNAL.jsing2022-10-021-66/+66
* Wire up SSL_QUIC_METHOD callbacks to the record layer callbacks for QUIC.jsing2022-08-211-1/+8
* Implement the SSL_CTRL_GET_SHARED_GROUP controltb2022-08-171-1/+37
* Deduplicate peer certificate chain processing code.jsing2022-08-171-4/+11
* Stop using ssl{_ctx,}_security() outside of ssl_seclevel.ctb2022-07-021-3/+2
* Rename uses 'curve' to 'group' and rework tls1 group API.tb2022-07-021-3/+3
* Make ssl_cert_add{0,1}_chain_cert() take ssl/ctxtb2022-06-291-5/+5
* ssl_cert_set{0,1}_chain() take ssl/ctxtb2022-06-291-7/+7
* Add support for sending QUIC transport parametersbeck2022-06-291-1/+9
* Also check the security level when choosing a shared ciphertb2022-06-291-1/+5
* Also check the security level of the 'tmp dh'tb2022-06-291-1/+11
* Clean up and simplify ssl3_renegotiate{,_check}()jsing2022-03-171-22/+15
* Switch TLSv1.3 cipher names from AEAD- to OpenSSL's TLS_tb2022-02-051-4/+4
* Bye bye S3I.jsing2022-02-051-76/+67
* whitespacetb2022-01-261-4/+4
* Rename CERT to SSL_CERT and CERT_PKEY to SSL_CERT_PKEY.jsing2022-01-081-2/+2
* Rename dh_tmp to dhe_params.jsing2022-01-071-13/+18
* Convert legacy server to tls_key_share.jsing2022-01-071-13/+1
* Convert legacy TLS client to tls_key_share.jsing2022-01-061-23/+5
* Rename tls13_key_share to tls_key_share.jsing2022-01-051-6/+7
* Do not take the strlen() of a NULL name. Defer the CBS_init() to later.tb2021-11-021-3/+3
* Ensure SSL_set_tlsext_host_name() is given a valid hostname.jsing2021-11-011-3/+8
* Fold SSL_SESSION_INTERNAL back into SSL_SESSION.jsing2021-10-251-3/+3
* Don't leak internal->verfied_chain, clean it up in ssl3_clear and free.beck2021-10-241-1/+4
* Prepare to provide SSL_get_tlsext_status_type()tb2021-09-081-1/+10
* Dedup dtls1_dispatch_alert()/ssl3_dispatch_alert().jsing2021-07-261-2/+2
* Do a first pass clean up of SSL_METHOD.jsing2021-07-031-46/+1
* Merge SSL_METHOD_INTERNAL into SSL_METHOD.jsing2021-07-011-9/+10
* Prepare to provide SSL_get_signature_nid() and friends.jsing2021-06-301-1/+66
* Move DTLS structs/definitions/prototypes to dtls_locl.h.jsing2021-05-161-2/+3
* Explicitly include <openssl/opensslconf.h> in files using OPENSSL_NO_*jsing2021-05-161-1/+2
* Clean up TLSv1.2 certificate request handshake data.jsing2021-04-211-3/+3
* Set alpn_selected_len to zero when freeing alpn_selected.jsing2021-04-191-1/+2
* Rename new_cipher to cipher.jsing2021-03-241-2/+2
* Move the TLSv1.3 handshake struct inside the shared handshake struct.jsing2021-03-211-15/+15
* Absorb ssl3_get_algorithm2() into ssl_get_handshake_evp_md().jsing2021-02-071-15/+1
* Correct handshake MAC/PRF for various TLSv1.2 cipher suites.jsing2021-02-071-8/+8
* Rewrap a comment line to fit into 80 columns.tb2021-01-261-3/+3
* Replace SSL_IS_DTLS with SSL_is_dtls().jsing2020-10-141-5/+5
* SSL3_ENC_METHOD is just a flag word; merge it into SSL_METHOD_INTERNALguenther2020-10-111-2/+2
* Constipate ssl3_ciphers and tls1[23]_sigalgs*, pushing them intoguenther2020-10-111-2/+2