summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_clnt.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Clean up and simplify the client verify code:jsing2019-03-311-50/+49
* Defer sigalgs selection until the certificate is known.jsing2019-03-251-12/+18
* Rework ssl3_output_cert_chain() to take a CERT_PKEY and consider chains.jsing2019-03-251-2/+2
* Revert TLS1_get{,_client}_version simplification because DTLS.jsing2019-03-191-2/+2
* Partially clean up the TLS1_get_{,client}_version macros.jsing2019-03-171-2/+2
* Rename tls1_handshake_hash*() to tls1_transcript_hash*().jsing2019-02-091-4/+4
* Modify sigalgs extension processing to accomodate TLS 1.3.beck2019-01-231-2/+3
* revert previous, accidentally contained another diff in additionbeck2019-01-231-3/+2
* Modify sigalgs extension processing for TLS 1.3.beck2019-01-231-2/+3
* Rename TLS extension handling to use less "hello".jsing2019-01-181-3/+3
* Refactor a tangle in ssl3_send_client_verify() into one function for eachtb2018-11-291-118/+213
* Fix DTLS transcript handling for HelloVerifyRequest.jsing2018-11-211-10/+5
* Revert previous - DTLSv1 uses MD5+SHA1 for RSA signature verification.jsing2018-11-191-5/+2
* Fix DTLS, because DTLS still remains a special flower, allows regress to passbeck2018-11-171-2/+5
* revert previousbeck2018-11-161-5/+3
* Fix DTLS. Because the DTLS code is strange. I am really coming around tobeck2018-11-161-3/+5
* Unbreak legacy ciphers for prior to 1.1 by setting having a legacybeck2018-11-161-2/+2
* Add check function to verify that pkey is usable with a sigalg.beck2018-11-111-2/+2
* Add support for RSA PSS algorithims being used in sigalgs.beck2018-11-111-1/+14
* Convert signatures and verifcation to use the EVP_DigestXXX apibeck2018-11-111-24/+52
* Stop keeping track of sigalgs by guessing it from digest and pkey,beck2018-11-101-12/+12
* Ensure we free the handshake transcript upon session resumption.jsing2018-11-091-1/+4
* Ensure we only choose sigalgs from our prefernce list, not the whole listbeck2018-11-091-2/+3
* Reimplement the sigalgs processing code into a new implementationbeck2018-11-091-18/+13
* Clean up and simplify the handshake transcript code.jsing2018-11-081-30/+16
* Stop pretending that a cert member in a SSL and SSL_CTX can be NULL.jsing2018-11-081-3/+3
* Ensure the handshake transcript is cleaned up.jsing2018-11-081-2/+13
* Use the newer/more sensible names for EVP_MD_CTX_* functions.jsing2018-09-051-3/+3
* Clean up handshake message start/finish functions.jsing2018-08-241-9/+9
* Rename and collapse tls12_get_sigandhash_cbb().jsing2018-08-191-2/+2
* Convert ssl3_send_client_verify() to CBB.jsing2018-08-171-43/+50
* Convert ssl3_get_server_key_exchange() to CBS.jsing2018-08-161-69/+55
* Remove now unused variable, that got left behind from a previous change.jsing2018-08-141-3/+1
* Actually check the return values for EVP_Sign* and EVP_Verify*.jsing2018-08-141-8/+12
* Simplify server key exchange signature verification.jsing2018-08-101-49/+18
* Check the return value from DH_size() in ssl3_send_client_kex_dhe().jsing2018-06-031-4/+6
* Fix a malloc() NULL check in ssl3_send_client_kex_ecdhe_ecp(), by addingjsing2018-05-131-2/+3
* Nuke SSL3_FLAGS_DELAY_CLIENT_FINISHED and SSL3_FLAGS_POP_BUFFER.jsing2018-04-071-15/+2
* Complete the TLS extension rewrite on the client-side.jsing2018-02-081-10/+18
* Rename ssl3_client_hello() to ssl3_send_client_hello() for consistency.jsing2017-10-121-3/+3
* Convert ssl3_client_hello() to CBB.jsing2017-10-111-36/+45
* ((remove) (some) (unnecessary) (parentheses))jsing2017-10-101-4/+4
* Merge dtls1_connect() into ssl3_connect(), removing a large amount ofjsing2017-10-101-21/+111
* Fix some style/whitespace/indentation issues in ssl3_connect().jsing2017-10-081-10/+9
* Convert TLS signature algorithms extension handling to the new framework.jsing2017-08-121-4/+2
* Remove NPN support.jsing2017-08-121-53/+3
* Remove support for DSS/DSA, since we removed the cipher suites a whilejsing2017-08-121-19/+2
* Move state from ssl->internal to the handshake structure.beck2017-05-071-53/+53
* Bring in an SSL_HANDSHAKE structure and commence the great shovellingbeck2017-05-061-17/+17
* Convert various client key exchange functions to freezero(3). The memoryjsing2017-04-101-14/+5