summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_locl.h (follow)
Commit message (Expand)AuthorAgeFilesLines
* Provide a version of ssl_msg_callback() that takes a CBS.jsing2022-09-101-1/+2
* Wire up SSL_QUIC_METHOD callbacks to the record layer callbacks for QUIC.jsing2022-08-211-2/+3
* Provide SSL_QUIC_METHOD.jsing2022-08-211-2/+3
* Tweak prototype to match function definition (n -> index)tb2022-08-181-2/+2
* Refactor tls1_get_supported_group()tb2022-08-171-2/+4
* Make tls1_get_{format,group_}list() take a const SSLtb2022-08-171-5/+5
* Provide ssl_security_shared_group()tb2022-08-171-1/+2
* Deduplicate peer certificate chain processing code.jsing2022-08-171-3/+7
* Provide record layer callbacks for QUIC.jsing2022-07-241-1/+5
* Convert TLS transcript from BUF_MEM to tls_buffer.jsing2022-07-221-2/+2
* Change various ALPN related internal struct memberstb2022-07-201-6/+6
* Provide SSL_is_quic()jsing2022-07-171-2/+3
* Annotate the security callback and the security ex_data as deliberatelytb2022-07-101-3/+3
* Unifdef LIBRESSL_HAS_SECURITY_LEVEL and remove some workaroundstb2022-07-071-3/+1
* Stop using ssl{_ctx,}_security() outside of ssl_seclevel.ctb2022-07-021-4/+6
* Rename uses 'curve' to 'group' and rework tls1 group API.tb2022-07-021-7/+7
* Check security level for supported groups.tb2022-06-301-1/+3
* Add checks to ensure we do not initiate or negotiate handshakes withtb2022-06-301-1/+2
* Make ssl_cert_add{0,1}_chain_cert() take ssl/ctxtb2022-06-291-3/+3
* ssl_cert_set{0,1}_chain() take ssl/ctxtb2022-06-291-3/+3
* Refactor use_certificate_chain_* to take ssl/ctx instead of a certtb2022-06-291-1/+2
* Add functions that check security level in certs and cert chains.tb2022-06-291-1/+5
* Parse the @SECLEVEL=n annotation in cipher stringstb2022-06-291-2/+2
* Add support for sending QUIC transport parametersbeck2022-06-291-1/+9
* whitespace nittb2022-06-291-2/+2
* Also check the security level of the 'tmp dh'tb2022-06-291-1/+2
* Check the security of DH key sharestb2022-06-291-1/+2
* Rename one s to ssl for consistencytb2022-06-291-2/+2
* Add prototypes for ssl{_ctx,}_security()tb2022-06-281-1/+5
* Implement the default security level callbacktb2022-06-281-1/+6
* Add security callback, level and ex_data fields to SSL_CERTtb2022-06-281-1/+6
* Switch sid_ctx_length in SSL, SSL_CTX and SSL_SESSION to a size_ttb2022-06-071-4/+4
* Switch SSL_SESSION's session_id_length to a size_ttb2022-06-071-2/+2
* Switch the SSL_SESSION's master_key_length to a size_ttb2022-06-071-2/+2
* Tweak comment describing the SSL_SESSION ASN.1tb2022-06-061-4/+5
* Fix spaces before tabstb2022-06-061-12/+12
* Add a use_psk_dhe_ke flag to the TLSv1.3 handshake structtb2022-06-031-1/+4
* Remove const from tls1_transcript_hash_value()jsing2022-03-171-2/+2
* Factor out change cipher spec handing code in the legacy stack.jsing2022-03-121-1/+2
* Factor out alert handing code in the legacy stack.libressl-v3.5.0jsing2022-02-211-1/+2
* Bye bye S3I.jsing2022-02-051-15/+7
* Cleanup/simplify ssl_cert_type()jsing2022-02-031-2/+2
* Remove peer_pkeys from SSL_SESSION.jsing2022-01-111-10/+3
* Rename 'peer' to 'peer_cert' in SSL_SESSION.jsing2022-01-111-2/+2
* Plumb decode errors through key share parsing code.jsing2022-01-111-3/+5
* Swap arguments to ssl_check_srvr_ecc_cert_and_alg()jsing2022-01-091-2/+2
* Merge SESS_CERT into SSL_SESSION.jsing2022-01-081-19/+10
* Remove commented out CERT_* defines.jsing2022-01-081-7/+1
* Rename CERT to SSL_CERT and CERT_PKEY to SSL_CERT_PKEY.jsing2022-01-081-45/+45
* Rename dh_tmp to dhe_params.jsing2022-01-071-4/+4