summaryrefslogtreecommitdiff
path: root/src/lib/libssl/tls13_record_layer.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Add and use tls13_record_layer_alert_sent()tb2024-09-091-2/+9
* Add message callbacks for alerts in the TLSv1.3 stack.jsing2024-01-271-3/+3
* Convert the legacy TLS stack to tls_content.jsing2022-11-111-1/+2
* Ensure there is no trailing data for a CCS received by the TLSv1.3 stack.jsing2022-09-111-1/+3
* Provide record layer callbacks for QUIC.jsing2022-07-241-3/+28
* Provide QUIC encryption levels.jsing2022-07-241-3/+3
* Remove tls_buffer_set_data() and remove/revise callers.jsing2022-07-201-2/+2
* Convert the new record layers to opaque EVP_AEAD_CTXtb2022-01-141-6/+3
* Allocate and free the EVP_AEAD_CTX struct in tls13_record_protection.jsing2022-01-061-7/+13
* Use CBS_get_last_u8() to find the content type in TLSv1.3 records.jsing2021-12-151-11/+12
* Implement flushing for TLSv1.3 handshakes.jsing2021-09-161-1/+7
* Factor out the TLSv1.3 code that handles content from TLS records.jsing2021-09-041-74/+34
* Ignore the record version for early alertstb2021-06-081-4/+10
* Avoid pulling ssl_locl.h into self-contained code.jsing2021-05-161-2/+1
* Make local header inclusion consistent.jsing2021-05-161-2/+1
* Split TLSv1.3 record protection from record layer.jsing2021-03-211-46/+72
* Convert tls13_record_layer.c to tls13_secret_{init,cleanup}()tb2021-01-051-21/+11
* Keep the various free calls of tls13_record_layer_free() in thetb2021-01-041-4/+4
* Free {alert,phh}_data in tls13_record_layer_free()tb2021-01-021-1/+4
* zap annoying stray spacestb2020-10-151-4/+4
* Rename tls13_record_layer_alert() to tls13_record_layer_enqueue_alert()jsing2020-10-031-3/+4
* Some SSL_AD_* defines snuck into the TLSv1.3 code - replace them withjsing2020-09-111-7/+7
* Send an unexpected message alert if no valid content type is found.jsing2020-08-111-2/+5
* Avoid passing -1 to freezero.tb2020-08-101-9/+10
* Cleanup aead_ctxinoguchi2020-08-041-1/+3
* Split the handling of post handshake handshake messages into itstb2020-06-011-55/+44
* Add a mechanism to set an alert in those parts of the read half oftb2020-06-011-3/+21
* Handle the case where we receive a valid 0 byte application data record.jsing2020-05-291-1/+10
* Add additional length checks for TLSv1.3 plaintext and inner plaintext.jsing2020-05-261-1/+6
* Provide the option to retry or return after post-handshake messages.jsing2020-05-231-3/+14
* Revert 1.43 - this fix for PHH in blocking mode breaks SSL_accept andbeck2020-05-201-2/+2
* Return TLS13_IO_WANT_POLLIN after processing post-handshake messages.jsing2020-05-161-2/+2
* Remove a no longer relevant XXX comment.jsing2020-05-131-3/+1
* Propagate record overflows to the record layer and alert.jsing2020-05-111-2/+4
* Add record version checks.jsing2020-05-111-5/+12
* Provide an alert sent record layer callback.jsing2020-05-111-1/+3
* Move the record layer callbacks into a struct.jsing2020-05-111-26/+12
* Provide alert defines for TLSv1.3 and use in the TLSv1.3 code.jsing2020-05-101-25/+26
* Send dummy ChangeCipherSpec messages from the TLSv1.3 client.jsing2020-05-091-3/+30
* Correct return value check to handle TLS13_IO_EOF case.jsing2020-05-091-2/+2
* On receiving a handshake or alert record with empty inner plaintext,tb2020-05-071-1/+11
* Accept two ChangeCipherSpec messages during a TLSv1.3 handshake.jsing2020-05-031-3/+3
* Add const to TLS1.3 internal vectorsinoguchi2020-05-021-2/+2
* tls13_record_layer internal functions to static in libsslinoguchi2020-04-291-4/+4
* The RFC is clear (section 5.3) that sequence number should never wrap.tb2020-03-161-5/+12
* Correct TLSv1.3 sequence number increment and wrapping check.jsing2020-03-131-3/+3
* drop unused include <openssl/curve25519.h>tb2020-02-181-3/+1
* Fix basement bug where record layer would not correctly deal withbeck2020-01-261-1/+4
* It is possible to receive a pre-TLSv1.3 alert in response to a TLSv1.3jsing2020-01-251-2/+15
* Fix breakage in SSL_connect, SSL_accept, etc. by not propagatingbeck2020-01-241-10/+34