summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_pkt.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Provide SSL_OP_NO_RENEGOTIATION and SSL_OP_ALLOW_CLIENT_RENEGOTIATION.jsing3 days1-2/+10
* Use cipher suite values instead of IDs.jsing2024-07-221-2/+2
* Remove cipher from SSL_SESSION.jsing2024-07-201-4/+5
* Remove old workaround for F5tb2023-07-111-13/+2
* Make internal header file names consistenttb2022-11-261-3/+3
* Convert the legacy TLS stack to tls_content.jsing2022-11-111-68/+52
* Use tls_buffer for alert and handshake fragments in the legacy stack.jsing2022-11-101-39/+69
* Add extra NULL check after ssl3_setup_read_buffer()tb2022-10-211-2/+5
* Get rid of SSL_CTX_INTERNAL and SSL_INTERNAL.jsing2022-10-021-76/+76
* Use CBS when procesing a CCS message in the legacy stack.jsing2022-09-111-4/+7
* Use CBS to parse TLS alerts in the legacy stack.jsing2022-09-101-4/+10
* Clean up {dtls1,ssl3}_read_bytes()jsing2022-03-261-107/+83
* Rewrite legacy TLS unexpected handshake message handling.jsing2022-03-171-78/+114
* Factor out unexpected handshake message handling code in the legacy stack.jsing2022-03-141-128/+135
* Factor out change cipher spec handing code in the legacy stack.jsing2022-03-121-35/+67
* Factor out alert handing code in the legacy stack.libressl-v3.5.0jsing2022-02-211-51/+71
* Bye bye S3I.jsing2022-02-051-102/+102
* Add record processing limit to DTLS code.jsing2021-10-251-2/+3
* Use ssl_force_want_read() in the DTLS code.jsing2021-10-251-13/+5
* Clean up and simplify info and msg callbacks.jsing2021-08-301-33/+12
* Clean up and simplify ssl3_dispatch_alert() and ssl3_send_alert().jsing2021-08-281-30/+32
* SSL_CTX_remove_session() checks for a NULL session, avoid doing it twice.jsing2021-08-041-2/+2
* We have defines for alert levels - use them instead of magic numbers.jsing2021-07-311-2/+2
* Dedup dtls1_dispatch_alert()/ssl3_dispatch_alert().jsing2021-07-261-4/+16
* Reject zero-length non-application data fragments in the legacy stack.jsing2021-06-291-1/+11
* Remove tls1_alert_code().jsing2021-06-131-5/+1
* Make local header inclusion consistent.jsing2021-05-161-3/+2
* Clean up tls1_change_cipher_state().jsing2021-05-021-9/+2
* Clean up derivation of finished/peer finished.jsing2021-04-251-26/+12
* Move finished and peer finished to the handshake struct.jsing2021-03-291-3/+3
* Rename new_cipher to cipher.jsing2021-03-241-3/+3
* Add SSL_HANDSHAKE_TLS12 for TLSv1.2 specific handshake data.jsing2021-03-241-2/+2
* Improve internal version handling.jsing2021-03-101-3/+4
* Rename f_err into fatal_err.tb2021-02-201-20/+20
* Enforce read ahead with DTLS.jsing2021-02-081-5/+5
* Provide functions to determine if TLSv1.2 record protection is engaged.jsing2021-01-191-7/+7
* Replace SSL_IS_DTLS with SSL_is_dtls().jsing2020-10-141-6/+6
* Reimplement the TLSv1.2 record handling for the read side.jsing2020-10-031-133/+33
* Start replacing the existing TLSv1.2 record layer.jsing2020-08-301-97/+6
* Fix some wrapping/indent.jsing2020-08-091-4/+3
* Use CBB more correctly when writing SSL3/DTLS records.jsing2020-08-091-41/+49
* Check the return value of tls1_enc() in the write path.jsing2020-08-021-3/+3
* Clean up/simplify more of the dtls1/ssl3 record writing code:jsing2020-08-011-25/+9
* Pull record version selection code up and pass it as an argument tojsing2020-08-011-15/+15
* Clean up and simplify some of the SSL3/DTLS1 record writing code.jsing2020-07-301-57/+58
* Consistently spell 'unsigned' as 'unsigned int', as style(9) seemstb2020-03-161-2/+2
* Stop overloading the record type for padding length.jsing2020-03-121-3/+2
* Use internal versions of SSL3_BUFFER, SSL3_RECORD and DTLS1_RECORD_DATA.jsing2020-03-121-10/+10
* Remove the enc function pointers.jsing2020-03-101-6/+4
* The decryption_failed alert must not be sent by compliant implementations.tb2020-02-231-2/+2