summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Add support to enforce restrictions on where extensions can appearbeck2019-01-172-12/+38
* Add a direct copy of the exension parsing code to be modified for tls13.beck2019-01-173-2/+1596
* Remove an ugly hack in the client certificate verification code that workstb2018-12-071-48/+44
* Send SSL_AD_DECODE alerts in the case of a bad hello request or antb2018-12-031-7/+7
* Refactor a tangle in ssl3_send_client_verify() into one function for eachtb2018-11-291-118/+213
* Fix DTLS transcript handling for HelloVerifyRequest.jsing2018-11-214-18/+26
* Revert previous - DTLSv1 uses MD5+SHA1 for RSA signature verification.jsing2018-11-192-10/+4
* Revert previous - the default sigalg for RSA key exchange is {sha1,rsa}.jsing2018-11-191-4/+4
* Fix DTLS, because DTLS still remains a special flower, allows regress to passbeck2018-11-172-4/+10
* revert previousbeck2018-11-161-5/+3
* Fix DTLS. Because the DTLS code is strange. I am really coming around tobeck2018-11-161-3/+5
* Unbreak legacy ciphers for prior to 1.1 by setting having a legacybeck2018-11-164-10/+22
* Fix wrong sizeof argument by using 'uint16_t *', with minor nit from tb@,mestre2018-11-141-2/+2
* In TLS1.2 we use evp_sha1 if we fall back this far, not evp_md5_sha1 as in 1.1beck2018-11-141-2/+2
* Temporary workaround for breakage seen in www.videolan.org with curve mismatchbeck2018-11-131-3/+4
* NULL out mdctx to prevent possible double free introduced in version 1.4beck2018-11-131-1/+2
* Fix pkey_ok to be less strange, and add cuve checks required for the EC onesbeck2018-11-131-9/+26
* Add check function to verify that pkey is usable with a sigalg.beck2018-11-114-7/+24
* quiet warning on other compilersbcook2018-11-111-3/+3
* bump minors after symbol addition.tb2018-11-111-1/+1
* Add SSL_set1_host(), a thin wrapper around X509_VERIFY_PARAM_set1_host().tb2018-11-113-2/+10
* Nuke trailing whitespacebeck2018-11-111-6/+6
* Free the server tls transcript in case session reuse did not work.bluhm2018-11-111-3/+4
* Add support for RSA PSS algorithims being used in sigalgs.beck2018-11-112-2/+29
* Convert signatures and verifcation to use the EVP_DigestXXX apibeck2018-11-113-45/+93
* Remove dead codebeck2018-11-102-16/+2
* Tweak and improve the TLSv1.3 state machine.jsing2018-11-101-24/+46
* Avoid a double allocation and memory leak.jsing2018-11-101-4/+2
* Stop keeping track of sigalgs by guessing it from digest and pkey,beck2018-11-108-92/+102
* Use TLS13_HS_{CLIENT,SERVER} instead of using a redundant _SEND{,S}.tb2018-11-101-30/+28
* Fix last of the empty hash nonsensebeck2018-11-101-26/+3
* Fix the TLSv1.3 key schedule implementation.jsing2018-11-092-66/+95
* Use "send" and "recv" consistently instead of mixing them with "read"tb2018-11-091-98/+108
* Ensure we free the handshake transcript upon session resumption.jsing2018-11-091-1/+4
* Ensure we only choose sigalgs from our prefernce list, not the whole listbeck2018-11-094-10/+19
* Add the ability to have a separate priority list for sigalgs.beck2018-11-094-12/+43
* Correct defines for writer tests in connect/accept loops.jsing2018-11-091-3/+3
* Correct function naming for tls13_handshake_advance_state_machine().jsing2018-11-091-4/+2
* Avoid leak: free existing SRTP connection profiles beforetb2018-11-091-1/+2
* Add header guards and hidden declarations.jsing2018-11-092-2/+19
* Add header guards and hidden declarations.jsing2018-11-091-1/+10
* Reimplement the sigalgs processing code into a new implementationbeck2018-11-099-253/+340
* First skeleton of the TLS 1.3 state machine. Based on RFC 8446 andtb2018-11-083-4/+607
* KNFbeck2018-11-081-3/+4
* Clean up and simplify the handshake transcript code.jsing2018-11-0810-166/+144
* Stop pretending that a cert member in a SSL and SSL_CTX can be NULL.jsing2018-11-088-121/+18
* Move #include <openssl/evp.h> to the header.tb2018-11-082-3/+4
* Ensure the handshake transcript is cleaned up.jsing2018-11-082-3/+20
* Add initial TLS 1.3 key schedule support with basic regress testsbeck2018-11-073-2/+436
* Add TLSv1.3 cipher suites (with appropriate guards).jsing2018-11-076-9/+100