summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
* Unbreak bidirectional SSL_shutdown for TLSv1.3libressl-v3.1.4tb2020-08-171-1/+2
* LibreSSL 3.1.4 - Interoperability and bug fixes for the TLSv1.3 client:tb2020-08-108-66/+189
* OpenBSD 6.7 errata 004 6.7/004_libssl.patch.siglibressl-v3.1.2tb2020-05-193-3/+15
* Accept two ChangeCipherSpec messages during a TLSv1.3 handshake.jsing2020-05-031-3/+3
* Add const to TLS1.3 internal vectorsinoguchi2020-05-022-14/+14
* tls13_record_layer internal functions to static in libsslinoguchi2020-04-291-4/+4
* tls13_handshake internal functions to static in libsslinoguchi2020-04-291-11/+12
* Move legacy stack interfacing functions into tls13_legacy.c.jsing2020-04-284-199/+206
* Rename tls13_client_synthetic_handshake_message() and move to tls13_lib.c.jsing2020-04-283-47/+48
* Shuffle some functions around.jsing2020-04-272-329/+328
* Switch to NEGOTIATED when using WITHOUT_HRR.jsing2020-04-251-4/+9
* Move unsupported, obsolete ciphers and deprecated aliases out ofschwarze2020-04-251-31/+29
* tweak the wording to make it clearer under which conditions exactlyschwarze2020-04-251-4/+4
* Improve TLSv1.3 state machine for HelloRetryRequest handling.jsing2020-04-225-66/+104
* Handle TLSv1.3 key shares other than X25519 on the server side.jsing2020-04-212-16/+34
* Consolidate TLSv1.3 constants.jsing2020-04-213-40/+47
* Provide TLSv1.3 cipher suite aliases to match the names used in RFC 8446.jsing2020-04-191-2/+25
* Fix wrapping/indentation.jsing2020-04-181-4/+3
* Expose the peer ephemeral public key used for TLSv1.3 key exchange.jsing2020-04-185-36/+79
* Tweak previous active cipher suite code.jsing2020-04-181-6/+5
* Allow more key share groups for TLSv1.3.jsing2020-04-181-21/+12
* Only include TLSv1.3 cipher suites if there are active cipher suites.jsing2020-04-171-2/+10
* Generate client key share using our preferred group.jsing2020-04-174-25/+37
* Update in several respects:schwarze2020-04-141-13/+11
* add the missing sentence "LibreSSL no longer provides any suchschwarze2020-04-141-2/+3
* Delete the three sentences listing the ciphers currently includedschwarze2020-04-141-15/+2
* Document the TLSv1.3 control word, update the description of theschwarze2020-04-111-4/+30
* Include TLSv1.3 cipher suites unless cipher string references TLSv1.3.jsing2020-04-091-6/+19
* Tidy line wrapping and remove an extra blank line.jsing2020-04-091-4/+3
* ssl_aes_is_accelerated() returns a boolean - treat it as such, rather thanjsing2020-04-091-2/+2
* Ensure legacy session ID is persistent during client TLS session.jsing2020-04-081-9/+14
* Send a zero-length session identifier if TLSv1.3 is not enabled.jsing2020-04-061-4/+7
* Void functions obviously do not return values; no need to elaborate.schwarze2020-03-305-31/+10
* Void functions obviously do not return values; no need to elaborate.schwarze2020-03-291-5/+2
* Consistently spell 'unsigned' as 'unsigned int', as style(9) seemstb2020-03-167-44/+45
* The RFC is clear (section 5.3) that sequence number should never wrap.tb2020-03-161-5/+12
* Remove dtls1_enc().jsing2020-03-135-222/+11
* Correct TLSv1.3 sequence number increment and wrapping check.jsing2020-03-131-3/+3
* Ensure that CBB_add_space() always provides zeroed memory.jsing2020-03-131-1/+2
* Use calloc() rather than malloc() when allocating initial CBB buffer.jsing2020-03-121-4/+3
* Use calloc() rather than malloc() when allocating buffers.jsing2020-03-121-3/+3
* Stop overloading the record type for padding length.jsing2020-03-125-13/+10
* Use internal versions of SSL3_BUFFER, SSL3_RECORD and DTLS1_RECORD_DATA.jsing2020-03-129-53/+83
* Use ctx->hs->secrets rather than the S3I(s) version.jsing2020-03-102-4/+4
* Remove some unnecessary handshake enums/functions.jsing2020-03-104-26/+4
* Add a return value check to tls13_buffer_extend().jsing2020-03-101-1/+4
* Remove the enc function pointers.jsing2020-03-106-22/+12
* RFC 8446, section 4.1.3: If a TLSv1.2 client receives a ServerHello fortb2020-03-061-1/+27
* TLSv1.3 servers that intend to downgrade are required to set the lasttb2020-03-061-4/+8
* The decryption_failed alert must not be sent by compliant implementations.tb2020-02-231-2/+2