summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_locl.h (follow)
Commit message (Expand)AuthorAgeFilesLines
* Make internal header file names consistenttb2022-11-261-1538/+0
* Convert the legacy TLS stack to tls_content.jsing2022-11-111-4/+7
* Use tls_buffer for alert and handshake fragments in the legacy stack.jsing2022-11-101-7/+4
* Rewrite TLSv1.2 key exporter.jsing2022-11-071-4/+1
* Provide ssl_session_dup()tb2022-10-201-1/+2
* Extend SSL_SESSION struct for TLSv1.3 PSKtb2022-10-201-2/+4
* Get rid of SSL_CTX_INTERNAL and SSL_INTERNAL.jsing2022-10-021-94/+86
* Move handshake message handling functions from ssl_both.c to client/server.jsing2022-10-011-36/+1
* Provide a version of ssl_msg_callback() that takes a CBS.jsing2022-09-101-1/+2
* Wire up SSL_QUIC_METHOD callbacks to the record layer callbacks for QUIC.jsing2022-08-211-2/+3
* Provide SSL_QUIC_METHOD.jsing2022-08-211-2/+3
* Tweak prototype to match function definition (n -> index)tb2022-08-181-2/+2
* Refactor tls1_get_supported_group()tb2022-08-171-2/+4
* Make tls1_get_{format,group_}list() take a const SSLtb2022-08-171-5/+5
* Provide ssl_security_shared_group()tb2022-08-171-1/+2
* Deduplicate peer certificate chain processing code.jsing2022-08-171-3/+7
* Provide record layer callbacks for QUIC.jsing2022-07-241-1/+5
* Convert TLS transcript from BUF_MEM to tls_buffer.jsing2022-07-221-2/+2
* Change various ALPN related internal struct memberstb2022-07-201-6/+6
* Provide SSL_is_quic()jsing2022-07-171-2/+3
* Annotate the security callback and the security ex_data as deliberatelytb2022-07-101-3/+3
* Unifdef LIBRESSL_HAS_SECURITY_LEVEL and remove some workaroundstb2022-07-071-3/+1
* Stop using ssl{_ctx,}_security() outside of ssl_seclevel.ctb2022-07-021-4/+6
* Rename uses 'curve' to 'group' and rework tls1 group API.tb2022-07-021-7/+7
* Check security level for supported groups.tb2022-06-301-1/+3
* Add checks to ensure we do not initiate or negotiate handshakes withtb2022-06-301-1/+2
* Make ssl_cert_add{0,1}_chain_cert() take ssl/ctxtb2022-06-291-3/+3
* ssl_cert_set{0,1}_chain() take ssl/ctxtb2022-06-291-3/+3
* Refactor use_certificate_chain_* to take ssl/ctx instead of a certtb2022-06-291-1/+2
* Add functions that check security level in certs and cert chains.tb2022-06-291-1/+5
* Parse the @SECLEVEL=n annotation in cipher stringstb2022-06-291-2/+2
* Add support for sending QUIC transport parametersbeck2022-06-291-1/+9
* whitespace nittb2022-06-291-2/+2
* Also check the security level of the 'tmp dh'tb2022-06-291-1/+2
* Check the security of DH key sharestb2022-06-291-1/+2
* Rename one s to ssl for consistencytb2022-06-291-2/+2
* Add prototypes for ssl{_ctx,}_security()tb2022-06-281-1/+5
* Implement the default security level callbacktb2022-06-281-1/+6
* Add security callback, level and ex_data fields to SSL_CERTtb2022-06-281-1/+6
* Switch sid_ctx_length in SSL, SSL_CTX and SSL_SESSION to a size_ttb2022-06-071-4/+4
* Switch SSL_SESSION's session_id_length to a size_ttb2022-06-071-2/+2
* Switch the SSL_SESSION's master_key_length to a size_ttb2022-06-071-2/+2
* Tweak comment describing the SSL_SESSION ASN.1tb2022-06-061-4/+5
* Fix spaces before tabstb2022-06-061-12/+12
* Add a use_psk_dhe_ke flag to the TLSv1.3 handshake structtb2022-06-031-1/+4
* Remove const from tls1_transcript_hash_value()jsing2022-03-171-2/+2
* Factor out change cipher spec handing code in the legacy stack.jsing2022-03-121-1/+2
* Factor out alert handing code in the legacy stack.libressl-v3.5.0jsing2022-02-211-1/+2
* Bye bye S3I.jsing2022-02-051-15/+7
* Cleanup/simplify ssl_cert_type()jsing2022-02-031-2/+2