summaryrefslogtreecommitdiff
path: root/src/lib/libssl/tls13_internal.h (follow)
Commit message (Expand)AuthorAgeFilesLines
* This is errata/6.8/013_libressl.patch.siglibressl-v3.2.4tb2021-02-031-1/+15
* Add minimal info callback support for TLSv1.3tb2020-07-301-1/+7
* Improve argument order for the internal tlsext APItb2020-07-031-2/+2
* Implement a rolling hash of the ClientHello message, Enforce RFC 8446beck2020-06-061-1/+8
* Wire up the servername callback in the TLSv1.3 server.jsing2020-05-291-1/+2
* Provide the option to retry or return after post-handshake messages.jsing2020-05-231-1/+2
* Add support for TLS 1.3 server to send certificate statusbeck2020-05-191-2/+3
* Add TLS13_ERR_NO_CERTIFICATE.jsing2020-05-161-2/+3
* Propagate record overflows to the record layer and alert.jsing2020-05-111-1/+2
* Add record version checks.jsing2020-05-111-12/+13
* Provide an alert sent record layer callback.jsing2020-05-111-1/+2
* Move the record layer callbacks into a struct.jsing2020-05-111-5/+11
* Send dummy ChangeCipherSpec messages from the TLSv1.3 servertb2020-05-101-1/+3
* Honour SSL_VERIFY_FAIL_IF_NO_PEER_CERT in the TLSv1.3 server.jsing2020-05-101-1/+2
* Provide alert defines for TLSv1.3 and use in the TLSv1.3 code.jsing2020-05-101-1/+32
* Back out server side CCS sending. It breaks TLSv1.3 client communicationtb2020-05-091-2/+1
* Send dummy ChangeCipherSpec messages from the TLSv1.3 servertb2020-05-091-1/+2
* Send dummy ChangeCipherSpec messages from the TLSv1.3 client.jsing2020-05-091-1/+3
* Add a middlebox_compat flag and condition session ID randomisation on it.jsing2020-05-091-1/+2
* Add support for certificate status requests in TLS 1.3 clientbeck2020-05-091-1/+3
* Move legacy stack interfacing functions into tls13_legacy.c.jsing2020-04-281-1/+8
* Rename tls13_client_synthetic_handshake_message() and move to tls13_lib.c.jsing2020-04-281-1/+2
* Improve TLSv1.3 state machine for HelloRetryRequest handling.jsing2020-04-221-3/+3
* Consolidate TLSv1.3 constants.jsing2020-04-211-6/+7
* Expose the peer ephemeral public key used for TLSv1.3 key exchange.jsing2020-04-181-1/+2
* Generate client key share using our preferred group.jsing2020-04-171-2/+3
* Remove some unnecessary handshake enums/functions.jsing2020-03-101-3/+1
* Pull the handshake message transcript code into its own function.jsing2020-02-051-1/+2
* Rework tls13_legacy_handshake_message_{recv,sent}_cb() to usetb2020-02-051-2/+2
* Provide struct/functions for handling TLSv1.3 key shares.jsing2020-01-301-1/+23
* Move pad and verify context into tls13_lib.cbeck2020-01-261-1/+6
* Add an underbar for consistency.tb2020-01-251-2/+2
* Support legacy message callbacks. First step for SSL_set_msg_callback(3)tb2020-01-251-1/+5
* It is possible to receive a pre-TLSv1.3 alert in response to a TLSv1.3jsing2020-01-251-1/+2
* Complete the initial TLSv1.3 implementation.jsing2020-01-241-1/+2
* Switch to encrypted records in the TLSv1.3 server.jsing2020-01-241-1/+2
* Fix breakage in SSL_connect, SSL_accept, etc. by not propagatingbeck2020-01-241-2/+3
* Implement client hello processing in the TLSv1.3 server.jsing2020-01-231-4/+5
* Add checking int the client to check the magic values which arebeck2020-01-231-1/+4
* Implement pending for TLSv1.3.jsing2020-01-231-1/+3
* Add a TLS13_IO_ALERT return value so that we can explicitly signal whenjsing2020-01-231-4/+5
* Pass a CBB to TLSv1.3 send handlers.jsing2020-01-231-15/+15
* Pass a handshake message content CBS to TLSv1.3 receive handlers.jsing2020-01-221-15/+16
* Implement support for SSL_peek() in the TLSv1.3 record layer.jsing2020-01-221-1/+2
* After the ClientHello has been sent or received and before the peer'stb2020-01-221-1/+2
* The legacy_record_version must be set to TLS1_2_VERSION excepttb2020-01-221-1/+4
* Add minimal support for hello retry request for RFC conformance.beck2020-01-221-1/+2
* Implement close-notify and SSL_shutdown() handling for the TLSv1.3 client.jsing2020-01-221-1/+6
* Correct legacy fallback for TLSv1.3 client.jsing2020-01-211-1/+2
* Add alert processing in tls client code, by adding alert to thebeck2020-01-211-1/+2