summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Hoist ERR_clear_error() call into the derr: labeltb2020-09-011-4/+2
* simplify tls1_process_ticket() exit pathtb2020-09-012-19/+7
* Return code tweaks for session ticket handlerstb2020-08-313-47/+51
* Send alert on ssl_get_prev_session failuretb2020-08-314-20/+32
* Start replacing the existing TLSv1.2 record layer.jsing2020-08-307-195/+614
* Send an unexpected message alert if no valid content type is found.jsing2020-08-111-2/+5
* Increment the epoch in the same place for both read and write.jsing2020-08-111-3/+3
* Use 0 instead of 0x00 for memset() calls.jsing2020-08-112-8/+8
* Use SSL3_SEQUENCE_SIZE for last_write_sequence[] rather than hardcoding.jsing2020-08-111-2/+2
* In SSL_new() just 'goto err' on allocation failure.jsing2020-08-111-11/+6
* Avoid passing -1 to freezero.tb2020-08-101-9/+10
* Fix some wrapping/indent.jsing2020-08-091-4/+3
* Add P-521 to the list of curves supported by default in the client.jsing2020-08-091-5/+18
* Use CBB more correctly when writing SSL3/DTLS records.jsing2020-08-092-66/+92
* Make the explicit IV length handling in DTLS the same as SSL3/TLS.jsing2020-08-091-8/+13
* Cleanup aead_ctxinoguchi2020-08-041-1/+3
* Only parse a client's status_request in the CHtb2020-08-031-1/+4
* Ensure clients only send a status_request in the CHtb2020-08-031-3/+7
* Correctly handle server requests for an OCSP responsetb2020-08-031-1/+12
* Check the return value of tls1_enc() in the write path.jsing2020-08-022-6/+6
* Clean up/simplify more of the dtls1/ssl3 record writing code:jsing2020-08-012-73/+34
* Pull record version selection code up and pass it as an argument tojsing2020-08-011-15/+15
* Have ssl_init_wbio_buffer() push the buffering BIO rather than doing itjsing2020-07-301-5/+2
* Clean up and simplify some of the SSL3/DTLS1 record writing code.jsing2020-07-302-76/+72
* Add minimal info callback support for TLSv1.3tb2020-07-303-3/+32
* Handle SSL_MODE_AUTO_RETRY being changed during a TLSv1.3 session.jsing2020-07-251-1/+4
* Dedup the use legacy stack code.jsing2020-07-141-56/+25
* Revert the TLSv1.3 version switching fix/hack.jsing2020-07-141-10/+1
* Remove some unnecessary function pointers from SSL_METHOD_INTERNAL.jsing2020-07-075-64/+17
* Enable TLSv1.3 for the generic TLS_method().jsing2020-07-072-5/+52
* zap trailing whitespace on one linetb2020-07-031-2/+2
* Make the message type available to the extension functionstb2020-07-032-167/+181
* Improve argument order for the internal tlsext APItb2020-07-038-39/+39
* Switch the order of the two tests in tls13_client_hello_required_extensionstb2020-06-251-9/+9
* Make tls13_legacy_shutdown() match ssl3_shutdown() semantics.jsing2020-06-241-21/+22
* Enforce restrictions for ClientHello extensionstb2020-06-241-1/+44
* We inherited the constant time CBC padding removal from BoringSSL, buttb2020-06-191-4/+4
* The check_includes step is incorrect dependency management model forderaadt2020-06-091-11/+1
* Implement a rolling hash of the ClientHello message, Enforce RFC 8446beck2020-06-066-7/+179
* Use IANA allocated GOST ClientCertificateTypes.jsing2020-06-053-9/+15
* Stop sending GOST R 34.10-94 as a CertificateType.jsing2020-06-051-3/+1
* Handle GOST in ssl_cert_dup().jsing2020-06-051-1/+5
* Enable GOST_SIG_FORMAT_RS_LE when verifying certificate signatures.jsing2020-06-052-2/+15
* Align tls13_server_select_certificate() withtb2020-06-041-3/+7
* Improve client certificate selection for TLSv1.3tb2020-06-041-16/+80
* mention that TLS_method(3) also supports TLSv1.3;schwarze2020-06-041-3/+3
* Remove const modifier in return type of tls13_handshake_active_state()tb2020-06-021-3/+3
* distracting whitespacetb2020-06-021-5/+5
* Split the handling of post handshake handshake messages into itstb2020-06-011-55/+44
* Send an illegal_parameter alert if a client sends us invalid DH keytb2020-06-011-3/+15