summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Provide TLS 1.3 cipher AEAD/hash and legacy I/O handling functions.jsing2019-01-213-2/+210
* Move struct tls13_ctx into a header since other things need access to it.jsing2019-01-213-21/+21
* Ensure we free TLS 1.3 handshake state.jsing2019-01-211-6/+11
* Teach ssl_version_string() about TLS1_3_VERSION.jsing2019-01-211-1/+3
* Store the record version and make it available for use.jsing2019-01-212-10/+21
* Fix header guardtb2019-01-201-2/+5
* Provide a handshake message handling implementation for TLS 1.3.jsing2019-01-203-3/+213
* Provide an initial implementation of the TLS 1.3 record layer.jsing2019-01-203-6/+790
* Provide a way to get just the record header.jsing2019-01-202-7/+33
* revert second hunk of previous that was committed by accidenttb2019-01-201-2/+2
* Add missing prototype for tls13_handshake_active_action().tb2019-01-201-2/+4
* Add some internal consistency checks to the handshake state handling.jsing2019-01-201-9/+23
* TLS 1.3 clients always need to send the supported groups extension.jsing2019-01-201-4/+5
* Add an explicit flag to indicate a successful handshake insteadtb2019-01-201-8/+6
* Sort HDRS/SRCS lists and use one line per source file for maintainability.jsing2019-01-191-16/+44
* Add handshake message type checking and special case certificate requests.jsing2019-01-191-1/+30
* Tweak return value handling in the TLSv1.3 handshake code.jsing2019-01-192-44/+47
* Provide a TLS record handling implementation.jsing2019-01-193-2/+220
* bump minors after symbol additiontb2019-01-191-1/+1
* copyrightbeck2019-01-181-1/+2
* bump copyright years appopriatelybeck2019-01-181-3/+3
* Add client side of supported versions and keyshare extensions with basic regressbeck2019-01-184-4/+262
* Expose some symbols in a new tls13_handshake.h for regression testing.tb2019-01-183-99/+93
* Remove this copy, we have decided we can do this in placebeck2019-01-183-1633/+2
* Add support for RFC 8446 section 4.2 enforcing which extensions maybeck2019-01-181-8/+43
* Rename TLS extension handling to use less "hello".jsing2019-01-184-220/+228
* Get rid of is_serverhello in preparation for other messagesbeck2019-01-171-13/+24
* Provide an extensible buffer implementation that uses a read callback.jsing2019-01-173-3/+148
* Add support to enforce restrictions on where extensions can appearbeck2019-01-172-12/+38
* Add a direct copy of the exension parsing code to be modified for tls13.beck2019-01-173-2/+1596
* Remove an ugly hack in the client certificate verification code that workstb2018-12-071-48/+44
* Send SSL_AD_DECODE alerts in the case of a bad hello request or antb2018-12-031-7/+7
* Refactor a tangle in ssl3_send_client_verify() into one function for eachtb2018-11-291-118/+213
* Fix DTLS transcript handling for HelloVerifyRequest.jsing2018-11-214-18/+26
* Revert previous - DTLSv1 uses MD5+SHA1 for RSA signature verification.jsing2018-11-192-10/+4
* Revert previous - the default sigalg for RSA key exchange is {sha1,rsa}.jsing2018-11-191-4/+4
* Fix DTLS, because DTLS still remains a special flower, allows regress to passbeck2018-11-172-4/+10
* revert previousbeck2018-11-161-5/+3
* Fix DTLS. Because the DTLS code is strange. I am really coming around tobeck2018-11-161-3/+5
* Unbreak legacy ciphers for prior to 1.1 by setting having a legacybeck2018-11-164-10/+22
* Fix wrong sizeof argument by using 'uint16_t *', with minor nit from tb@,mestre2018-11-141-2/+2
* In TLS1.2 we use evp_sha1 if we fall back this far, not evp_md5_sha1 as in 1.1beck2018-11-141-2/+2
* Temporary workaround for breakage seen in www.videolan.org with curve mismatchbeck2018-11-131-3/+4
* NULL out mdctx to prevent possible double free introduced in version 1.4beck2018-11-131-1/+2
* Fix pkey_ok to be less strange, and add cuve checks required for the EC onesbeck2018-11-131-9/+26
* Add check function to verify that pkey is usable with a sigalg.beck2018-11-114-7/+24
* quiet warning on other compilersbcook2018-11-111-3/+3
* bump minors after symbol addition.tb2018-11-111-1/+1
* Add SSL_set1_host(), a thin wrapper around X509_VERIFY_PARAM_set1_host().tb2018-11-113-2/+10
* Nuke trailing whitespacebeck2018-11-111-6/+6