summaryrefslogtreecommitdiff
path: root/src/lib/libssl/tls13_record_layer.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* This is errata/6.8/013_libressl.patch.siglibressl-v3.2.4tb2021-02-031-1/+4
* Some SSL_AD_* defines snuck into the TLSv1.3 code - replace them withjsing2020-09-111-7/+7
* Send an unexpected message alert if no valid content type is found.jsing2020-08-111-2/+5
* Avoid passing -1 to freezero.tb2020-08-101-9/+10
* Cleanup aead_ctxinoguchi2020-08-041-1/+3
* Split the handling of post handshake handshake messages into itstb2020-06-011-55/+44
* Add a mechanism to set an alert in those parts of the read half oftb2020-06-011-3/+21
* Handle the case where we receive a valid 0 byte application data record.jsing2020-05-291-1/+10
* Add additional length checks for TLSv1.3 plaintext and inner plaintext.jsing2020-05-261-1/+6
* Provide the option to retry or return after post-handshake messages.jsing2020-05-231-3/+14
* Revert 1.43 - this fix for PHH in blocking mode breaks SSL_accept andbeck2020-05-201-2/+2
* Return TLS13_IO_WANT_POLLIN after processing post-handshake messages.jsing2020-05-161-2/+2
* Remove a no longer relevant XXX comment.jsing2020-05-131-3/+1
* Propagate record overflows to the record layer and alert.jsing2020-05-111-2/+4
* Add record version checks.jsing2020-05-111-5/+12
* Provide an alert sent record layer callback.jsing2020-05-111-1/+3
* Move the record layer callbacks into a struct.jsing2020-05-111-26/+12
* Provide alert defines for TLSv1.3 and use in the TLSv1.3 code.jsing2020-05-101-25/+26
* Send dummy ChangeCipherSpec messages from the TLSv1.3 client.jsing2020-05-091-3/+30
* Correct return value check to handle TLS13_IO_EOF case.jsing2020-05-091-2/+2
* On receiving a handshake or alert record with empty inner plaintext,tb2020-05-071-1/+11
* Accept two ChangeCipherSpec messages during a TLSv1.3 handshake.jsing2020-05-031-3/+3
* Add const to TLS1.3 internal vectorsinoguchi2020-05-021-2/+2
* tls13_record_layer internal functions to static in libsslinoguchi2020-04-291-4/+4
* The RFC is clear (section 5.3) that sequence number should never wrap.tb2020-03-161-5/+12
* Correct TLSv1.3 sequence number increment and wrapping check.jsing2020-03-131-3/+3
* drop unused include <openssl/curve25519.h>tb2020-02-181-3/+1
* Fix basement bug where record layer would not correctly deal withbeck2020-01-261-1/+4
* It is possible to receive a pre-TLSv1.3 alert in response to a TLSv1.3jsing2020-01-251-2/+15
* Fix breakage in SSL_connect, SSL_accept, etc. by not propagatingbeck2020-01-241-10/+34
* Implement pending for TLSv1.3.jsing2020-01-231-1/+19
* Add a TLS13_IO_ALERT return value so that we can explicitly signal whenjsing2020-01-231-4/+7
* Implement support for SSL_peek() in the TLSv1.3 record layer.jsing2020-01-221-5/+31
* After the ClientHello has been sent or received and before the peer'stb2020-01-221-5/+11
* The legacy_record_version must be set to TLS1_2_VERSION excepttb2020-01-221-6/+12
* Implement close-notify and SSL_shutdown() handling for the TLSv1.3 client.jsing2020-01-221-7/+19
* Correct legacy fallback for TLSv1.3 client.jsing2020-01-211-1/+7
* Add alerts to the tls 1.3 record layer and handshake layerbeck2020-01-201-44/+26
* Add support for TLS 1.3 post handshake messages and key updating.beck2019-11-261-12/+56
* Provide a clean interface for sending TLSv1.3 alerts.jsing2019-11-181-2/+14
* Change tls13_record_layer_phh() to take a CBS as this avoids ownershipjsing2019-11-171-5/+4
* Add a reference for the non-standard post-handshake handshake (PHH).tb2019-11-171-2/+2
* Ensure that we are never operating in plaintext mode once the handshakejsing2019-11-171-1/+7
* Provide framework for sending alerts and post-handshake handshake messages.jsing2019-11-171-14/+169
* Separate the callbacks for recieved and completed post handshake messagesbeck2019-11-171-5/+15
* Remove the alert level from the TLSv1.3 alert callback.jsing2019-03-171-2/+2
* Correct return values for non-fatal alerts.jsing2019-02-261-3/+3
* Correctly handle oversize writes.jsing2019-02-251-2/+4
* Remove temporary gotos.jsing2019-02-231-7/+3
* Wire up alert handling for TLSv1.3.jsing2019-02-211-7/+46