summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_locl.h (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Factor out/rewrite the ECDHE EC point key exchange code.jsing2020-01-301-1/+9
* Remove dead prototypes.jsing2020-01-291-10/+1
* Remove the ssl_get_message function pointer from SSL_METHOD_INTERNAL.jsing2020-01-231-3/+1
* Correctly handle TLSv1.3 ciphers suites in ssl3_choose_cipher().jsing2020-01-231-1/+9
* Save the legacy session id in the client, and enforce that it is returnedbeck2020-01-231-1/+5
* Switch back to a function pointer for ssl_pending.jsing2020-01-231-3/+4
* Wire up the TLSv1.3 server.jsing2020-01-221-1/+2
* Fix things so that `make -DTLS1_3` works again.jsing2020-01-221-1/+3
* Enable the TLSv1.3 client in libssl.jsing2020-01-221-2/+3
* Move guards from public to internal headers, and fix not use values.beck2020-01-221-1/+6
* Bring back the ssl_shutdown internal method pointer.jsing2019-11-171-1/+2
* Pass the session ID down to the session/ticket handling code as a CBS.jsing2019-04-221-5/+4
* Inline and remove the tlsext_tick_md macro.jsing2019-04-221-2/+1
* Clean up the cipher/digest table mess.jsing2019-04-041-2/+1
* Strip out all of the pkey to sigalg and sigalg to pkey linkages.jsing2019-03-251-3/+1
* tls1_process_sigalgs() is no longer needed.jsing2019-03-251-2/+1
* Defer sigalgs selection until the certificate is known.jsing2019-03-251-1/+5
* Remove ssl_get_server_send_cert() which is now unused.jsing2019-03-251-2/+1
* Rework ssl3_output_cert_chain() to take a CERT_PKEY and consider chains.jsing2019-03-251-2/+2
* Add a chain member to CERT_PKEY and provide functions for manipulating it.jsing2019-03-251-1/+8
* revert "Move struct ssl_handshake_tls13_st definition", i.e., movetb2019-02-251-1/+24
* Move struct ssl_handshake_tls13_st definitioninoguchi2019-02-251-24/+1
* Provide a TLS 1.3 capable client method.jsing2019-02-141-1/+3
* Preserve the transcript hash at specific stages of the TLSv1.3 handshake.jsing2019-02-101-1/+5
* Rename tls1_handshake_hash*() to tls1_transcript_hash*().jsing2019-02-091-5/+5
* Add server side of versions, keyshare, and client and server of cookiebeck2019-01-241-1/+4
* move the extensions_seen into the handshake structbeck2019-01-241-1/+4
* Modify sigalgs extension processing to accomodate TLS 1.3.beck2019-01-231-2/+2
* revert previous, accidentally contained another diff in additionbeck2019-01-231-8/+2
* Modify sigalgs extension processing for TLS 1.3.beck2019-01-231-2/+8
* Add ssl_cipher_is_permitted(), an internal helper function thattb2019-01-211-1/+3
* Move struct tls13_ctx into a header since other things need access to it.jsing2019-01-211-1/+3
* Add client side of supported versions and keyshare extensions with basic regressbeck2019-01-181-1/+19
* Fix DTLS transcript handling for HelloVerifyRequest.jsing2018-11-211-1/+2
* Stop keeping track of sigalgs by guessing it from digest and pkey,beck2018-11-101-4/+6
* Reimplement the sigalgs processing code into a new implementationbeck2018-11-091-7/+1
* Clean up and simplify the handshake transcript code.jsing2018-11-081-7/+10
* Stop pretending that a cert member in a SSL and SSL_CTX can be NULL.jsing2018-11-081-2/+1
* Add TLSv1.3 cipher suites (with appropriate guards).jsing2018-11-071-1/+4
* Rename the TLS Supported Elliptic Curves extension to Supported Groups.jsing2018-11-051-8/+8
* Clean up the code that checks if we can choose an EC cipher suite.jsing2018-11-051-2/+1
* Mop up ecdh_tmp, since it is no longer used.jsing2018-11-051-3/+1
* Make more of libssl's record layer state internal.jsing2018-10-241-1/+11
* SSL_MAX_DIGEST is no longer needed.jsing2018-09-081-5/+1
* Drop SSL_CIPHER_ALGORITHM2_AEAD flag.jsing2018-09-061-10/+6
* Correctly clear the current cipher state, when changing cipher state.jsing2018-09-051-3/+4
* Nuke ssl_pending/ssl_shutdown function pointers.jsing2018-08-301-4/+1
* n2s and l2n3 finally bite the dust!jsing2018-08-271-7/+1
* Simplify new session ticket encoding/generation.jsing2018-08-271-1/+3
* Simplify session ticket parsing/handling.jsing2018-08-241-6/+7