summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* In ssl.h rev. 1.167 and s3_lib.c rev. 1.188, jsing@ providedschwarze2020-01-021-4/+21
* Revise SSL_CTX_get_extra_chain_certs() to match OpenSSL behaviour.jsing2020-01-022-8/+23
* Provide TLSEXT_TYPE_* aliases for TLS 1.3.jsing2020-01-021-1/+10
* spelling; from bryan stensonjmc2019-12-191-3/+3
* Fix typo: ECHD -> ECDH.tb2019-12-031-4/+4
* Add support for TLS 1.3 post handshake messages and key updating.beck2019-11-263-20/+217
* Add accessors to change the buffer in a handshake message.beck2019-11-203-3/+20
* Add prototypes for the functions that update application secretsbeck2019-11-181-1/+3
* Provide a clean interface for sending TLSv1.3 alerts.jsing2019-11-182-5/+17
* Change tls13_record_layer_phh() to take a CBS as this avoids ownershipjsing2019-11-172-8/+6
* Correct update of application traffic secrets to use an empty contextbeck2019-11-171-3/+7
* Bring back the ssl_shutdown internal method pointer.jsing2019-11-173-4/+21
* Add a reference for the non-standard post-handshake handshake (PHH).tb2019-11-171-2/+2
* Ensure that we are never operating in plaintext mode once the handshakejsing2019-11-171-1/+7
* Provide framework for sending alerts and post-handshake handshake messages.jsing2019-11-172-15/+174
* indent with a tab instead of 8 spacestb2019-11-171-2/+2
* Move the TLSv1.3 server message handling stubs.jsing2019-11-172-125/+125
* Add the initial framework for the TLSv1.3 server.jsing2019-11-173-3/+84
* tls13_connect() should be static.jsing2019-11-171-2/+2
* Fix backoff to legacy when in client auth mode.beck2019-11-171-2/+2
* Drop back to the legacy tls method if we are doing client authenticaitonbeck2019-11-171-1/+7
* Separate the callbacks for recieved and completed post handshake messagesbeck2019-11-173-10/+22
* Revert previous deduplication diff, I broke portable in a strange way.beck2019-11-161-47/+58
* Deduplicate some extension processing code.beck2019-11-151-58/+47
* Add missing cross-reference to NOTES section.millert2019-11-141-3/+3
* Allow ip addresses as argument to SSL_set1_host() but be careful to nototto2019-11-041-2/+14
* Bump libcrypto, libssl and libtls minors due to symbol additions.jsing2019-11-021-1/+1
* Bump libcrypto, libssl and libtls majors due to changes in struct sizesjsing2019-10-241-2/+2
* Use a valid curve when constructing an EC_KEY that looks like X25519.jsing2019-10-041-2/+3
* Further improve the documentation of library initialization and configuration.schwarze2019-06-143-37/+37
* add missing backlinks to ssl(3)schwarze2019-06-1231-64/+100
* List all 17 SSL pages that were missing.schwarze2019-06-121-51/+89
* remove pointless NOTES section header linesschwarze2019-06-089-27/+27
* provide getters and setters for the RSA_METHOD interfacegilles2019-06-051-1/+1
* Relax parsing of TLS key share extensions on the server.jsing2019-05-291-5/+2
* Do not send an SNI extension when resuming a session that contains a serverjsing2019-05-291-1/+4
* Fix typo and label indent.jsing2019-05-281-3/+3
* Tidy up some names/structures following the renaming of TLS extensionjsing2019-05-281-35/+35
* *an* RSA;jmc2019-05-202-6/+6
* s3 is never NULL since s2 (formerly used for SSLv2) does not exist, so there isbcook2019-05-153-29/+20
* Remove unused pad check, which is handled by tls1_cbc_remove_padding() now.bcook2019-05-131-4/+2
* In DTLS, use_srtp is part of the extended server hello while in TLSv1.3,tb2019-05-081-2/+3
* Use calloc/freezero when allocating and freeing the session ticket data.jsing2019-04-251-4/+6
* Use EVP_CIPHER_CTX_{new,free}() and HMAC_CTX_{new,free}() instead ofjsing2019-04-251-24/+29
* Rename some variables in tls_decrypt_ticket().jsing2019-04-251-18/+18
* Convert tls_decrypt_ticket() to CBS.jsing2019-04-231-44/+72
* Provide a derr label (decode/decrypt error) in tls1_decrypt_ticket().jsing2019-04-221-41/+29
* Pass the session ID down to the session/ticket handling code as a CBS.jsing2019-04-224-35/+36
* Inline and remove the tlsext_tick_md macro.jsing2019-04-223-6/+5
* Clean up tls1_process_ticket().jsing2019-04-211-39/+43