summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_srvr.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Simplify the cleanup of init_buf via a ssl3_release_init_buffer() function.jsing2020-09-241-5/+3
* Simplify SSL method lookups.jsing2020-09-171-4/+2
* Use the correct type for tls1_set_ec_id()tb2020-09-121-3/+3
* Remove cipher_list_by_id.jsing2020-09-111-5/+1
* Send alert on ssl_get_prev_session failuretb2020-08-311-3/+3
* Improve argument order for the internal tlsext APItb2020-07-031-3/+3
* Enable GOST_SIG_FORMAT_RS_LE when verifying certificate signatures.jsing2020-06-051-1/+8
* Send an illegal_parameter alert if a client sends us invalid DH keytb2020-06-011-3/+15
* Correct downgrade sentinels when a version pinned method is in use.jsing2020-05-311-3/+3
* Replace SSL_PKEY_RSA_ENC/SSL_PKEY_RSA_SIGN with SSL_PKEY_RSA.jsing2020-05-191-2/+2
* Use size_t for OCSP response length.jsing2020-05-101-2/+2
* On receiving an overlong session ID terminate with an illegal_parametertb2020-05-091-1/+6
* TLSv1.3 servers that intend to downgrade are required to set the lasttb2020-03-061-4/+8
* Avoid leak for tmp.x25519inoguchi2020-02-161-4/+7
* Factor out/rewrite the ECDHE EC point key exchange code.jsing2020-01-301-77/+21
* Remove the ssl_get_message function pointer from SSL_METHOD_INTERNAL.jsing2020-01-231-6/+5
* If we are building a legacy server hello, check to see if we arebeck2020-01-231-1/+20
* Pass the session ID down to the session/ticket handling code as a CBS.jsing2019-04-221-3/+2
* Inline and remove the tlsext_tick_md macro.jsing2019-04-221-2/+2
* Defer sigalgs selection until the certificate is known.jsing2019-03-251-2/+2
* Rework ssl3_output_cert_chain() to take a CERT_PKEY and consider chains.jsing2019-03-251-4/+4
* Rename tls1_handshake_hash*() to tls1_transcript_hash*().jsing2019-02-091-3/+3
* Rename TLS extension handling to use less "hello".jsing2019-01-181-3/+3
* Remove an ugly hack in the client certificate verification code that workstb2018-12-071-48/+44
* Fix DTLS transcript handling for HelloVerifyRequest.jsing2018-11-211-5/+2
* Add check function to verify that pkey is usable with a sigalg.beck2018-11-111-3/+3
* quiet warning on other compilersbcook2018-11-111-3/+3
* Free the server tls transcript in case session reuse did not work.bluhm2018-11-111-3/+4
* Add support for RSA PSS algorithims being used in sigalgs.beck2018-11-111-1/+15
* Convert signatures and verifcation to use the EVP_DigestXXX apibeck2018-11-111-18/+40
* Stop keeping track of sigalgs by guessing it from digest and pkey,beck2018-11-101-23/+12
* Ensure we only choose sigalgs from our prefernce list, not the whole listbeck2018-11-091-2/+3
* Add the ability to have a separate priority list for sigalgs.beck2018-11-091-2/+2
* Reimplement the sigalgs processing code into a new implementationbeck2018-11-091-23/+13
* Clean up and simplify the handshake transcript code.jsing2018-11-081-51/+23
* Stop pretending that a cert member in a SSL and SSL_CTX can be NULL.jsing2018-11-081-7/+1
* Ensure the handshake transcript is cleaned up.jsing2018-11-081-1/+7
* Convert ssl3_get_cert_verify() to CBS and clean up somewhat.jsing2018-08-271-74/+72
* Add some missing statics.jsing2018-08-271-2/+2
* Simplify new session ticket encoding/generation.jsing2018-08-271-63/+38
* Simplify session ticket parsing/handling.jsing2018-08-241-8/+7
* Pull up the parsing of a ClientHello.jsing2018-08-241-20/+20
* Clean up handshake message start/finish functions.jsing2018-08-241-17/+17
* Correct session ticket encryption.jsing2018-08-221-4/+11
* Rename and collapse tls12_get_sigandhash_cbb().jsing2018-08-191-3/+2
* Convert ssl3_send_newsession_ticket() to CBB.jsing2018-08-191-55/+64
* Simplify the add signature code/logic in ssl3_send_server_key_exchange().jsing2018-08-161-13/+8
* Convert ssl3_send_server_key_exchange() to CBB.jsing2018-08-161-44/+45
* Actually check the return values for EVP_Sign* and EVP_Verify*.jsing2018-08-141-7/+11
* Simplify server kex exchange signature generation.jsing2018-08-101-61/+33