summaryrefslogtreecommitdiff
path: root/src/lib/libssl/tls13_client.c (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Move legacy stack interfacing functions into tls13_legacy.c.jsing2020-04-281-102/+4
* Rename tls13_client_synthetic_handshake_message() and move to tls13_lib.c.jsing2020-04-281-45/+2
* Shuffle some functions around.jsing2020-04-271-101/+107
* Improve TLSv1.3 state machine for HelloRetryRequest handling.jsing2020-04-221-37/+73
* Consolidate TLSv1.3 constants.jsing2020-04-211-11/+1
* Generate client key share using our preferred group.jsing2020-04-171-12/+15
* Ensure legacy session ID is persistent during client TLS session.jsing2020-04-081-9/+14
* Send a zero-length session identifier if TLSv1.3 is not enabled.jsing2020-04-061-4/+7
* Use ctx->hs->secrets rather than the S3I(s) version.jsing2020-03-101-2/+2
* According to RFC 8446, Section 4.4.4, recipients of incorrect Finishedtb2020-02-231-2/+2
* drop unused include <openssl/curve25519.h>tb2020-02-181-2/+1
* Add support for handling hello retry requests in the TLSv1.3 client.jsing2020-02-061-5/+100
* Refactor the server hello processing code in the TLSv1.3 client.jsing2020-02-051-21/+42
* Remove the hello retry request processing code that was previously added.jsing2020-02-051-57/+14
* Free the transcript as soon as we initialise the transcript hash.jsing2020-02-041-1/+2
* Provide struct/functions for handling TLSv1.3 key shares.jsing2020-01-301-8/+13
* If the TLSv1.3 code has not recorded an error and something already existsjsing2020-01-291-1/+2
* When switching back to a legacy client or server, ensure we reset thejsing2020-01-261-1/+2
* Add client certificate support for tls 1.3beck2020-01-261-2/+148
* Move pad and verify context into tls13_lib.cbeck2020-01-261-20/+5
* Only perform the downgrade check if our max version is less than TLSv1.3.jsing2020-01-251-15/+17
* It is possible to receive a pre-TLSv1.3 alert in response to a TLSv1.3jsing2020-01-251-1/+7
* When certificate validation fails, we must send a DECRYPT_ERROR alertbeck2020-01-231-3/+6
* Add checking int the client to check the magic values which arebeck2020-01-231-1/+17
* Save the legacy session id in the client, and enforce that it is returnedbeck2020-01-231-6/+13
* Pass a CBB to TLSv1.3 send handlers.jsing2020-01-231-16/+5
* Pass a handshake message content CBS to TLSv1.3 receive handlers.jsing2020-01-221-55/+26
* Send alerts on certificate verification failures of server certsbeck2020-01-221-2/+2
* After the ClientHello has been sent or received and before the peer'stb2020-01-221-1/+4
* Correctly set the legacy version when TLSv1.3 is building a client hello.jsing2020-01-221-4/+11
* The legacy_record_version must be set to TLS1_2_VERSION excepttb2020-01-221-1/+12
* Add minimal support for hello retry request for RFC conformance.beck2020-01-221-1/+64
* Correct legacy fallback for TLSv1.3 client.jsing2020-01-211-7/+21
* Add alert processing in tls client code, by adding alert to thebeck2020-01-211-16/+21
* Provide an error framework for use with the TLSv1.3 code.jsing2020-01-201-1/+3
* tls13_connect() should be static.jsing2019-11-171-2/+2
* Fix backoff to legacy when in client auth mode.beck2019-11-171-2/+2
* Drop back to the legacy tls method if we are doing client authenticaitonbeck2019-11-171-1/+7
* By design, our state machine is a DAG contrary to the state machine intb2019-04-051-4/+1
* Implement legacy fallback for the TLS 1.3 client.jsing2019-04-041-6/+81
* Defer sigalgs selection until the certificate is known.jsing2019-03-251-2/+2
* Set the SSL state as part of tls13_legacy_connect().jsing2019-02-281-2/+5
* Add a handshake action sent handler and use it for client finished.jsing2019-02-251-9/+14
* Correct a few error returns.jsing2019-02-251-4/+4
* Switch to application traffic keys as appropriate.jsing2019-02-141-1/+17
* Split tls13_record_layer_set_traffic_keys() into two separate functions.jsing2019-02-141-3/+5
* Clean up some pesky trailing whitespace.jsing2019-02-131-10/+10
* Handle finished messages in TLSv1.3 client.jsing2019-02-131-1/+130
* Implement handling of Certificate and CertificateVerify messages.jsing2019-02-111-1/+213
* Rename tls1_handshake_hash*() to tls1_transcript_hash*().jsing2019-02-091-3/+3