summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_tlsext.c (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Rename tls13_key_share to tls_key_share.jsing2022-01-051-12/+12
* Pull key share group/length CBB code up from tls13_key_share_public()jsing2022-01-041-5/+18
* Only allow zero length key shares when we know we're doing HRR.jsing2022-01-041-3/+5
* Improve SNI hostname validation.jsing2021-11-011-7/+52
* Fold SSL_SESSION_INTERNAL back into SSL_SESSION.jsing2021-10-251-9/+9
* Do not ignore SSL_TLSEXT_ERR_FATAL from the ALPN callbacktb2021-09-101-2/+18
* Correct the is_server flag in the call to the debug callback to be correct.beck2021-09-021-2/+2
* Use appropriate TLS version when building client sigalg extensions.jsing2021-06-291-2/+6
* Change ssl_sigalgs_build() to perform sigalg list selection.jsing2021-06-271-21/+3
* Only use SSL_AD_* internally.jsing2021-06-111-25/+25
* Simplify tlsext_ecpf_parse()tb2021-06-081-8/+4
* Adjust alert for ECPF without uncompressed point formattb2021-06-081-3/+4
* Make local header inclusion consistent.jsing2021-05-161-3/+2
* Explicitly include <openssl/opensslconf.h> in files using OPENSSL_NO_*jsing2021-05-161-1/+2
* Only hash known CH extensionstb2021-04-221-5/+5
* Move finished and peer finished to the handshake struct.jsing2021-03-291-2/+2
* Move the TLSv1.3 handshake struct inside the shared handshake struct.jsing2021-03-211-30/+30
* Improve internal version handling.jsing2021-03-101-77/+39
* Remove bogus DTLS checks to disable ECC and OCSP.jsing2021-02-081-7/+2
* Replace SSL_IS_DTLS with SSL_is_dtls().jsing2020-10-141-11/+11
* Constipate srtp_known_profiles, pushing it into .data.rel.roguenther2020-10-111-4/+4
* Constipate ssl3_ciphers and tls1[23]_sigalgs*, pushing them intoguenther2020-10-111-11/+11
* Set alpn_selected_len = 0 when alpn_selected is NULLinoguchi2020-09-091-1/+4
* Only parse a client's status_request in the CHtb2020-08-031-1/+4
* Ensure clients only send a status_request in the CHtb2020-08-031-3/+7
* Correctly handle server requests for an OCSP responsetb2020-08-031-1/+12
* zap trailing whitespace on one linetb2020-07-031-2/+2
* Make the message type available to the extension functionstb2020-07-031-85/+89
* Improve argument order for the internal tlsext APItb2020-07-031-11/+11
* Implement a rolling hash of the ClientHello message, Enforce RFC 8446beck2020-06-061-1/+35
* Mop up servername_done, which is unused.jsing2020-05-291-2/+1
* Fix some stylistic nits from jsing.tb2020-05-241-8/+11
* Enforce that SNI hostnames be correct as per rfc 6066 and 5980.beck2020-05-231-16/+78
* Do not assume that server_group != 0 or tlsext_supportedgroups != NULLtb2020-05-231-8/+12
* Only send ocsp staples if the client asked for ocsp certificate status.beck2020-05-191-1/+2
* Add support for TLS 1.3 server to send certificate statusbeck2020-05-191-1/+23
* Fix pesky whitespace.jsing2020-05-131-2/+2
* Use size_t for OCSP response length.jsing2020-05-101-5/+2
* Only reset TLS extension state when parsing client hello or server hello.jsing2020-05-101-5/+7
* Add support for certificate status requests in TLS 1.3 clientbeck2020-05-091-6/+37
* Add support for HelloRetryRequests in the TLSv1.3 server.jsing2020-05-091-2/+32
* Handle TLSv1.3 key shares other than X25519 on the server side.jsing2020-04-211-5/+19
* drop unused include <openssl/curve25519.h>tb2020-02-181-2/+1
* Avoid potential NULL dereference when parsing a server keyshare extension.jsing2020-02-161-1/+4
* Correctly handle key share extensions in a hello retry request.jsing2020-02-061-3/+9
* Correctly unpack client key shares.jsing2020-02-011-4/+9
* Provide struct/functions for handling TLSv1.3 key shares.jsing2020-01-301-92/+17
* Add sigalgs for server side to enable client certificate processingbeck2020-01-261-5/+34
* Only discard the extension block for client hello and server hellojsing2020-01-251-2/+3
* Only send an RI extension for pre-TLSv1.3 versions.jsing2020-01-251-2/+2