summaryrefslogtreecommitdiff
path: root/src/lib/libssl/tls13_lib.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* This is errata/6.8/013_libressl.patch.siglibressl-v3.2.4tb2021-02-031-1/+73
* Some SSL_AD_* defines snuck into the TLSv1.3 code - replace them withjsing2020-09-111-3/+3
* Add minimal info callback support for TLSv1.3tb2020-07-301-1/+15
* Improve argument order for the internal tlsext APItb2020-07-031-3/+3
* Implement a rolling hash of the ClientHello message, Enforce RFC 8446beck2020-06-061-1/+80
* Ensure we only attach an ocsp staple to a leaf certificate, becausebeck2020-05-221-3/+9
* Simplify: transform a dangling else into an early return andtb2020-05-211-20/+20
* Avoid a shadowing issue by renaming cbs and cbb to cbb_hs and cbb_hs,tb2020-05-211-8/+7
* A failure of tls13_handshake_msg_new() could lead to a NULL dereftb2020-05-211-11/+15
* Add support for TLS 1.3 server to send certificate statusbeck2020-05-191-6/+6
* Send alerts back correctly when handling key shares, includingbeck2020-05-171-8/+19
* Free handshake message correctly, noticed by tb@beck2020-05-171-2/+2
* Provide an alert sent record layer callback.jsing2020-05-111-3/+21
* Move the record layer callbacks into a struct.jsing2020-05-111-4/+10
* Provide alert defines for TLSv1.3 and use in the TLSv1.3 code.jsing2020-05-101-6/+6
* Use size_t for OCSP response length.jsing2020-05-101-2/+2
* Correct tlsext_ocsp_resplen check.jsing2020-05-101-2/+2
* Add a middlebox_compat flag and condition session ID randomisation on it.jsing2020-05-091-1/+3
* Add support for certificate status requests in TLS 1.3 clientbeck2020-05-091-1/+29
* Rename tls13_client_synthetic_handshake_message() and move to tls13_lib.c.jsing2020-04-281-1/+44
* Consolidate TLSv1.3 constants.jsing2020-04-211-23/+39
* Move the TLSv1.3 code that interfaces with the legacy APIs/stack into ajsing2020-02-151-308/+1
* Rework tls13_legacy_handshake_message_{recv,sent}_cb() to usetb2020-02-051-11/+17
* If the TLSv1.3 code has not recorded an error and something already existsjsing2020-01-291-1/+5
* Move pad and verify context into tls13_lib.cbeck2020-01-261-1/+44
* Support legacy message callbacks. First step for SSL_set_msg_callback(3)tb2020-01-251-1/+28
* Permit 0 length writes, because openssl s_client is specialbeck2020-01-241-2/+2
* Enable SSL_ENC_FLAG_SIGALGS on TLSv1_3_enc_data.jsing2020-01-241-2/+2
* Fix breakage in SSL_connect, SSL_accept, etc. by not propagatingbeck2020-01-241-1/+5
* Implement client hello processing in the TLSv1.3 server.jsing2020-01-231-1/+4
* Correctly handle TLSv1.3 ciphers suites in ssl3_choose_cipher().jsing2020-01-231-1/+6
* Add checking int the client to check the magic values which arebeck2020-01-231-1/+9
* Implement pending for TLSv1.3.jsing2020-01-231-1/+17
* Add a TLS13_IO_ALERT return value so that we can explicitly signal whenjsing2020-01-231-3/+10
* Pass a handshake message content CBS to TLSv1.3 receive handlers.jsing2020-01-221-1/+4
* Implement support for SSL_peek() in the TLSv1.3 record layer.jsing2020-01-221-8/+6
* Don't add an extra unknown error if we got a fatal alertbeck2020-01-221-2/+3
* Add minimal support for hello retry request for RFC conformance.beck2020-01-221-1/+4
* Implement close-notify and SSL_shutdown() handling for the TLSv1.3 client.jsing2020-01-221-1/+51
* Provide SSL_R_UNKNOWN.jsing2020-01-211-2/+2
* Clear and free the tls13_ctx that hangs off an SSL *s fromtb2020-01-211-1/+2
* Provide an error framework for use with the TLSv1.3 code.jsing2020-01-201-4/+19
* Add support for TLS 1.3 post handshake messages and key updating.beck2019-11-261-3/+147
* Separate the callbacks for recieved and completed post handshake messagesbeck2019-11-171-2/+2
* Remove the alert level from the TLSv1.3 alert callback.jsing2019-03-171-2/+2
* Don't index a void pointer, fixes compilation with visual studio.millert2019-03-041-2/+3
* Implement non-SSL_MODE_ENABLE_PARTIAL_WRITE in tls13_legacy_write_bytes().jsing2019-02-281-3/+34
* Automatically complete the handshake from tls13_legacy_{read,write}_bytes()jsing2019-02-281-1/+13
* Add appropriate length checks to tls13_legacy_{read,write}_bytes()jsing2019-02-281-3/+9
* Correctly propagate EOF from BIO in tls13_legacy_wire_read().jsing2019-02-261-1/+3