summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* According to RFC 8446, Section 4.4.4, recipients of incorrect Finishedtb2020-02-232-4/+4
* Remove the s2n macro now that it is finally unused.jsing2020-02-211-4/+1
* Convert the SSL/TLS record creation code to CBB.jsing2020-02-211-18/+28
* Convert the DTLS header creation code to CBB.jsing2020-02-211-20/+27
* Remove some commented code, remove some pointless comments and move somejsing2020-02-211-17/+6
* Convert dtls1_build_sequence_number() to CBB.jsing2020-02-211-7/+15
* Move l2n/l2n8 into s3_cbc.c, since this is the only code that uses it.jsing2020-02-212-16/+16
* Remove prefix_len, since it is always zero.jsing2020-02-211-4/+3
* Remove now unused variable.jsing2020-02-211-3/+1
* Refactor do_ssl3_write().jsing2020-02-191-97/+98
* drop unused include <openssl/curve25519.h>tb2020-02-184-10/+4
* Avoid potential NULL dereference when parsing a server keyshare extension.jsing2020-02-161-1/+4
* Avoid leak for tmp.x25519inoguchi2020-02-162-5/+11
* Move the TLSv1.3 code that interfaces with the legacy APIs/stack into ajsing2020-02-153-309/+330
* Remove #include that is not needed.jsing2020-02-151-3/+1
* Re-enable the TLSv1.3 client since the known issues have been addressed.jsing2020-02-061-3/+1
* Add a workaround to make SSL_set_session() work with TLSv1.3.jsing2020-02-061-1/+9
* Add support for handling hello retry requests in the TLSv1.3 client.jsing2020-02-061-5/+100
* Correctly handle key share extensions in a hello retry request.jsing2020-02-062-4/+11
* Refactor the server hello processing code in the TLSv1.3 client.jsing2020-02-052-22/+46
* Remove the hello retry request processing code that was previously added.jsing2020-02-052-65/+16
* Provide tls1_transcript_unfreeze() to avoid the need for manual flagsjsing2020-02-052-3/+10
* Pull the handshake message transcript code into its own function.jsing2020-02-052-7/+14
* Rework tls13_legacy_handshake_message_{recv,sent}_cb() to usetb2020-02-053-16/+22
* Add support for TLSv1.3 key shares with secp256r1 and secp384r1 groups.jsing2020-02-041-5/+98
* Free the transcript as soon as we initialise the transcript hash.jsing2020-02-042-2/+4
* Correctly unpack client key shares.jsing2020-02-012-14/+11
* Disable TLSv1.3 client while some known issues are being addressed.jsing2020-02-011-1/+3
* Provide struct/functions for handling TLSv1.3 key shares.jsing2020-01-308-130/+299
* Factor out/rewrite the ECDHE EC point key exchange code.jsing2020-01-305-173/+188
* Remove dead prototypes.jsing2020-01-291-10/+1
* If the TLSv1.3 code has not recorded an error and something already existsjsing2020-01-293-3/+9
* Remove unused stub implementation of tls13_accept(). The correcttb2020-01-291-11/+1
* Fix SSL_CIPHER_descriptioninoguchi2020-01-261-2/+2
* When an SSL method is set, bump the max version back to that of thejsing2020-01-261-1/+10
* When switching back to a legacy client or server, ensure we reset thejsing2020-01-262-2/+4
* Fix basement bug where record layer would not correctly deal withbeck2020-01-261-1/+4
* Add server side support for requesting client certificates in tls 1.3beck2020-01-261-4/+173
* Add client certificate support for tls 1.3beck2020-01-262-15/+149
* Add sigalgs for server side to enable client certificate processingbeck2020-01-261-5/+34
* Move pad and verify context into tls13_lib.cbeck2020-01-264-68/+60
* Add an underbar for consistency.tb2020-01-251-2/+2
* Revert change to certificate request check from r1.45.jsing2020-01-251-3/+3
* Only perform the downgrade check if our max version is less than TLSv1.3.jsing2020-01-251-15/+17
* Preserve the transcript hash for the client finished message,beck2020-01-251-2/+3
* Support legacy message callbacks. First step for SSL_set_msg_callback(3)tb2020-01-253-3/+40
* Correct value for SSL_TLSEXT_MSG_HRR.jsing2020-01-251-2/+2
* Only discard the extension block for client hello and server hellojsing2020-01-251-2/+3
* Only send an RI extension for pre-TLSv1.3 versions.jsing2020-01-251-2/+2
* It is possible to receive a pre-TLSv1.3 alert in response to a TLSv1.3jsing2020-01-253-4/+24