summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_tlsext.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Set alpn_selected_len = 0 when alpn_selected is NULLinoguchi2020-09-091-1/+4
* Only parse a client's status_request in the CHtb2020-08-031-1/+4
* Ensure clients only send a status_request in the CHtb2020-08-031-3/+7
* Correctly handle server requests for an OCSP responsetb2020-08-031-1/+12
* zap trailing whitespace on one linetb2020-07-031-2/+2
* Make the message type available to the extension functionstb2020-07-031-85/+89
* Improve argument order for the internal tlsext APItb2020-07-031-11/+11
* Implement a rolling hash of the ClientHello message, Enforce RFC 8446beck2020-06-061-1/+35
* Mop up servername_done, which is unused.jsing2020-05-291-2/+1
* Fix some stylistic nits from jsing.tb2020-05-241-8/+11
* Enforce that SNI hostnames be correct as per rfc 6066 and 5980.beck2020-05-231-16/+78
* Do not assume that server_group != 0 or tlsext_supportedgroups != NULLtb2020-05-231-8/+12
* Only send ocsp staples if the client asked for ocsp certificate status.beck2020-05-191-1/+2
* Add support for TLS 1.3 server to send certificate statusbeck2020-05-191-1/+23
* Fix pesky whitespace.jsing2020-05-131-2/+2
* Use size_t for OCSP response length.jsing2020-05-101-5/+2
* Only reset TLS extension state when parsing client hello or server hello.jsing2020-05-101-5/+7
* Add support for certificate status requests in TLS 1.3 clientbeck2020-05-091-6/+37
* Add support for HelloRetryRequests in the TLSv1.3 server.jsing2020-05-091-2/+32
* Handle TLSv1.3 key shares other than X25519 on the server side.jsing2020-04-211-5/+19
* drop unused include <openssl/curve25519.h>tb2020-02-181-2/+1
* Avoid potential NULL dereference when parsing a server keyshare extension.jsing2020-02-161-1/+4
* Correctly handle key share extensions in a hello retry request.jsing2020-02-061-3/+9
* Correctly unpack client key shares.jsing2020-02-011-4/+9
* Provide struct/functions for handling TLSv1.3 key shares.jsing2020-01-301-92/+17
* Add sigalgs for server side to enable client certificate processingbeck2020-01-261-5/+34
* Only discard the extension block for client hello and server hellojsing2020-01-251-2/+3
* Only send an RI extension for pre-TLSv1.3 versions.jsing2020-01-251-2/+2
* Rename failure into alert_desc in tlsext_ocsp_server_parse().tb2020-01-221-5/+5
* fix previous: alert_desc needs to be an int.tb2020-01-221-2/+2
* Avoid modifying alert in the success path.tb2020-01-221-11/+17
* Revert previous deduplication diff, I broke portable in a strange way.beck2019-11-161-47/+58
* Deduplicate some extension processing code.beck2019-11-151-58/+47
* Relax parsing of TLS key share extensions on the server.jsing2019-05-291-5/+2
* Do not send an SNI extension when resuming a session that contains a serverjsing2019-05-291-1/+4
* Fix typo and label indent.jsing2019-05-281-3/+3
* Tidy up some names/structures following the renaming of TLS extensionjsing2019-05-281-35/+35
* In DTLS, use_srtp is part of the extended server hello while in TLSv1.3,tb2019-05-081-2/+3
* Defer sigalgs selection until the certificate is known.jsing2019-03-251-9/+6
* Revert TLS1_get{,_client}_version simplification because DTLS.jsing2019-03-191-5/+5
* Partially clean up the TLS1_get_{,client}_version macros.jsing2019-03-171-5/+5
* Revert r1.38 as it introduces use of a stack value post function return.jsing2019-02-031-50/+86
* unwrap a line introduced in previous.tb2019-01-311-3/+2
* Correct handling of TLS sigalgs extension for TLSv1.0/TLSv1.1.jsing2019-01-301-33/+19
* Deduplicate a bunch of replicated code in the extension handlingbeck2019-01-281-86/+50
* Add tls_extension_seen(), a utility to know if a particular extensionbeck2019-01-281-8/+13
* Add server side of versions, keyshare, and client and server of cookiebeck2019-01-241-19/+289
* move the extensions_seen into the handshake structbeck2019-01-241-4/+5
* Modify sigalgs extension processing to accomodate TLS 1.3.beck2019-01-231-3/+33
* revert previous, accidentally contained another diff in additionbeck2019-01-231-326/+22