summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_srvr.c (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Move the RSA-PSS check for TLSv1.3 to ssl_sigalg_pkey_ok().jsing2021-06-291-2/+2
* Change ssl_sigalgs_from_value() to perform sigalg list selection.jsing2021-06-271-3/+3
* Rename ssl_sigalg() to ssl_sigalg_from_value().jsing2021-06-271-3/+3
* Change ssl_sigalgs_build() to perform sigalg list selection.jsing2021-06-271-3/+5
* Make local header inclusion consistent.jsing2021-05-161-3/+2
* Move DTLS structs/definitions/prototypes to dtls_locl.h.jsing2021-05-161-1/+2
* Explicitly include <openssl/opensslconf.h> in files using OPENSSL_NO_*jsing2021-05-161-4/+6
* Clean up tls1_change_cipher_state().jsing2021-05-021-5/+3
* In the TLSv1.2 server, set up the key block after sending the CCS.jsing2021-05-021-7/+7
* Clean up dtls1_reset_seq_numbers().jsing2021-05-021-4/+1
* Clean up and harden TLSv1.2 master key derivation.jsing2021-04-301-15/+11
* Clean up derivation of finished/peer finished.jsing2021-04-251-5/+3
* Clean up TLSv1.2 certificate request handshake data.jsing2021-04-211-5/+5
* Move reuse_message, message_type, message_size and cert_verify into thejsing2021-04-191-11/+11
* Avoid transcript initialisation when sending a TLS HelloRequest.jsing2021-03-291-4/+6
* Garbage collect s->internal->typetb2021-03-271-3/+1
* Rename new_cipher to cipher.jsing2021-03-241-17/+17
* Add SSL_HANDSHAKE_TLS12 for TLSv1.2 specific handshake data.jsing2021-03-241-9/+9
* Remove ssl_downgrade_max_version().jsing2021-03-111-7/+5
* Improve internal version handling.jsing2021-03-101-2/+19
* ugly whitespacetb2021-02-201-6/+6
* Rename f_err into fatal_err.tb2021-02-201-69/+69
* Rename the truncated label into decode_err. This describes its purposetb2021-02-201-27/+27
* Revise HelloVerifyRequest handling for DTLSv1.2.jsing2021-02-201-2/+7
* Factor out the legacy stack version checks.jsing2021-02-071-13/+6
* Move sequence numbers into the new TLSv1.2 record layer.jsing2021-01-261-4/+3
* Provide functions to determine if TLSv1.2 record protection is engaged.jsing2021-01-191-3/+3
* Replace SSL_IS_DTLS with SSL_is_dtls().jsing2020-10-141-26/+26
* Condense and simplify TLS methods.jsing2020-10-111-2/+2
* Merge d1_{clnt,srvr}.c into ssl_{clnt,srvr}.cjsing2020-10-031-2/+41
* Simplify the cleanup of init_buf via a ssl3_release_init_buffer() function.jsing2020-09-241-5/+3
* Simplify SSL method lookups.jsing2020-09-171-4/+2
* Use the correct type for tls1_set_ec_id()tb2020-09-121-3/+3
* Remove cipher_list_by_id.jsing2020-09-111-5/+1
* Send alert on ssl_get_prev_session failuretb2020-08-311-3/+3
* Improve argument order for the internal tlsext APItb2020-07-031-3/+3
* Enable GOST_SIG_FORMAT_RS_LE when verifying certificate signatures.jsing2020-06-051-1/+8
* Send an illegal_parameter alert if a client sends us invalid DH keytb2020-06-011-3/+15
* Correct downgrade sentinels when a version pinned method is in use.jsing2020-05-311-3/+3
* Replace SSL_PKEY_RSA_ENC/SSL_PKEY_RSA_SIGN with SSL_PKEY_RSA.jsing2020-05-191-2/+2
* Use size_t for OCSP response length.jsing2020-05-101-2/+2
* On receiving an overlong session ID terminate with an illegal_parametertb2020-05-091-1/+6
* TLSv1.3 servers that intend to downgrade are required to set the lasttb2020-03-061-4/+8
* Avoid leak for tmp.x25519inoguchi2020-02-161-4/+7
* Factor out/rewrite the ECDHE EC point key exchange code.jsing2020-01-301-77/+21
* Remove the ssl_get_message function pointer from SSL_METHOD_INTERNAL.jsing2020-01-231-6/+5
* If we are building a legacy server hello, check to see if we arebeck2020-01-231-1/+20
* Pass the session ID down to the session/ticket handling code as a CBS.jsing2019-04-221-3/+2
* Inline and remove the tlsext_tick_md macro.jsing2019-04-221-2/+2
* Defer sigalgs selection until the certificate is known.jsing2019-03-251-2/+2