summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* In ssl.h rev. 1.165, tb@ provided version agnostic DTLS methods.schwarze2019-03-181-3/+26
* bump minors after symbol additiontb2019-03-171-1/+1
* Provide version agnostic DTLS methods.jsing2019-03-173-2/+27
* Correct return value handling in tls13_handshake_recv_action().jsing2019-03-171-2/+4
* Partially clean up the TLS1_get_{,client}_version macros.jsing2019-03-174-15/+14
* Remove the alert level from the TLSv1.3 alert callback.jsing2019-03-173-7/+6
* Don't index a void pointer, fixes compilation with visual studio.millert2019-03-041-2/+3
* Implement non-SSL_MODE_ENABLE_PARTIAL_WRITE in tls13_legacy_write_bytes().jsing2019-02-281-3/+34
* Automatically complete the handshake from tls13_legacy_{read,write}_bytes()jsing2019-02-283-3/+17
* Set the SSL state as part of tls13_legacy_connect().jsing2019-02-281-2/+5
* Add appropriate length checks to tls13_legacy_{read,write}_bytes()jsing2019-02-281-3/+9
* Remove unused record_type from TLSv1.3 handshake actions.jsing2019-02-281-16/+1
* Correct return values for non-fatal alerts.jsing2019-02-261-3/+3
* Correctly propagate EOF from BIO in tls13_legacy_wire_read().jsing2019-02-261-1/+3
* Fix gcc3 compilation error by using a forward declaration instead of atb2019-02-251-3/+3
* revert "Move struct ssl_handshake_tls13_st definition", i.e., movetb2019-02-252-24/+26
* Correctly handle oversize writes.jsing2019-02-251-2/+4
* Add a handshake action sent handler and use it for client finished.jsing2019-02-253-11/+22
* Correct a few error returns.jsing2019-02-251-4/+4
* Move struct ssl_handshake_tls13_st definitioninoguchi2019-02-252-26/+24
* Remove temporary gotos.jsing2019-02-231-7/+3
* Set BIO retry on TLS13_IO_WANT_POLLIN/TLS13_IO_WANT_POLLOUT.jsing2019-02-231-1/+3
* Wire up alert handling for TLSv1.3.jsing2019-02-212-9/+78
* Change the alert callback return type from int to void.jsing2019-02-212-9/+11
* Fix a few cases where int was used instead of ssize_t.jsing2019-02-211-3/+3
* Correct guards.jsing2019-02-141-3/+3
* Notify the record layer upon handshake completion.jsing2019-02-141-2/+4
* Switch to application traffic keys as appropriate.jsing2019-02-141-1/+17
* Split tls13_record_layer_set_traffic_keys() into two separate functions.jsing2019-02-143-17/+23
* Provide a TLS 1.3 capable client method.jsing2019-02-143-5/+50
* Clean up some pesky trailing whitespace.jsing2019-02-131-10/+10
* Handle finished messages in TLSv1.3 client.jsing2019-02-132-14/+131
* Implement handling of Certificate and CertificateVerify messages.jsing2019-02-112-31/+214
* "non-existant" is one of those words that don't exist, so use "non-existent"phessler2019-02-101-2/+2
* Preserve the transcript hash at specific stages of the TLSv1.3 handshake.jsing2019-02-102-2/+16
* Rename the file that contains the transcript handling code.jsing2019-02-092-3/+3
* Rename tls1_handshake_hash*() to tls1_transcript_hash*().jsing2019-02-097-29/+29
* Provide a reference from the TLSv1.3 context to the handshake state.jsing2019-02-092-19/+25
* Implement processing of EncryptedExtensions in the TLS 1.3 client.jsing2019-02-072-8/+28
* Implement parsing and processing of TLSv1.3 ServerHello messages.jsing2019-02-043-11/+187
* Make it easier to build with LIBRESSL_HAS_TLS1_3 enabled.jsing2019-02-041-1/+4
* Revert r1.38 as it introduces use of a stack value post function return.jsing2019-02-031-50/+86
* unwrap a line introduced in previous.tb2019-01-311-3/+2
* Correct handling of TLS sigalgs extension for TLSv1.0/TLSv1.1.jsing2019-01-301-33/+19
* Deduplicate a bunch of replicated code in the extension handlingbeck2019-01-281-86/+50
* Add tls_extension_seen(), a utility to know if a particular extensionbeck2019-01-282-9/+15
* Set pointer variables in tls13 handshake to NULL on clearbeck2019-01-241-1/+5
* Add server side of versions, keyshare, and client and server of cookiebeck2019-01-244-22/+307
* move the extensions_seen into the handshake structbeck2019-01-243-6/+12
* Remove SHA224 based sigalgs from use in TLS 1.2 as SHA224 is deprecated.beck2019-01-241-6/+1