summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
* Implement flushing for TLSv1.3 handshakes.jsing2021-09-165-7/+69
* Avoid typedef redefinitionlibressl-v3.4.0inoguchi2021-09-141-3/+1
* zap trailing white spacetb2021-09-141-2/+2
* Call the info cb on connect/accept exit in TLSv1.3tb2021-09-142-4/+16
* provide a small manual page for the SSL_set_psk_use_session_callback(3)schwarze2021-09-142-1/+88
* Merge the stub SSL_SESSION_is_resumable(3) manual page from theschwarze2021-09-143-3/+86
* merge the description of SSL_get_tlsext_status_type(3)schwarze2021-09-111-3/+35
* bump major after symbol addition and struct removal, struct visibilitytb2021-09-101-1/+1
* Update Symbols.list after API additionstb2021-09-101-0/+18
* Move SSL_set0_rbio() outside of LIBRESSL_HAS_TLS1_3tb2021-09-101-3/+1
* Expose SSL_get_tlext_status_type() in tls1.htb2021-09-101-3/+1
* Expose SSL_R_NO_APPLICATION_PROTOCOL in ssl.htb2021-09-101-3/+1
* Expose SSL_CTRL_GET_TLSEXT_STATUS_REQ_TYPE in ssl.htb2021-09-101-3/+1
* Expose SSL_CTX_get0_privatekey() in ssl.htb2021-09-101-3/+1
* Remove TLS1_get_{,client_}version()tb2021-09-101-9/+1
* Remove SSL3_RECORD and SSL3_BUFFERtb2021-09-101-25/+1
* Remove TLS1_RT_HEARTBEATtb2021-09-101-2/+1
* Make SSL opaquetb2021-09-101-2/+4
* Remove struct tls_session_ticket_ext_st and TLS_SESSION_TICKET_EXTtb2021-09-102-2/+6
* Do not ignore SSL_TLSEXT_ERR_FATAL from the ALPN callbacktb2021-09-104-7/+31
* Prepare to provide SSL_CTX_get0_privatekey()tb2021-09-102-2/+14
* Provide SSL_SESSION_is_resumable and SSL_set_psk_use_session_callback stubstb2021-09-083-3/+24
* Prepare to provide API stubs for PHAtb2021-09-082-2/+27
* Prepare to provide SSL_get_tlsext_status_type()tb2021-09-083-3/+20
* Prepare to provide SSL_set0_rbio()tb2021-09-082-2/+12
* Factor out the TLSv1.3 code that handles content from TLS records.jsing2021-09-046-80/+238
* Refactor ssl_update_cache. This now matches the logic used for TLS 1.3beck2021-09-041-22/+106
* Improve DTLS hello request handling code.jsing2021-09-041-2/+8
* Change dtls1_get_message_header() to take a CBS.jsing2021-09-043-22/+21
* Improve DTLS record header parsing.jsing2021-09-041-7/+7
* Use SSL3_HM_HEADER_LENGTH instead of the magic number 4.jsing2021-09-031-13/+14
* Ensure that a server hello does not have trailing data.jsing2021-09-031-1/+4
* Ensure that a client hello does not have trailing data.jsing2021-09-031-1/+4
* Set message_size correctly when switching to the legacy stack.jsing2021-09-031-2/+2
* We need to allow for either a CERTIFICATE or CERTIFICATE_STATUS messagebeck2021-09-021-2/+3
* Call the ocsp callback if present and we get no response, instead ofbeck2021-09-021-3/+2
* Correct the is_server flag in the call to the debug callback to be correct.beck2021-09-021-2/+2
* RFC 6066 section 8 allows the server MAY choose not send the CertificateStatusbeck2021-09-021-3/+37
* comment out the detailed description of SSL_get_servername(3),schwarze2021-09-011-7/+9
* Defragment DTLS.jsing2021-08-312-123/+48
* Remove a nonsensical s->version == TLS1_VERSION from DTLS code.jsing2021-08-311-6/+1
* Clean up and simplify info and msg callbacks.jsing2021-08-308-127/+88
* Replace DTLS r_epoch with the read epoch from the TLSv1.2 record layer.jsing2021-08-305-27/+26
* Move to an AEAD nonce allocated in the TLSv1.2 record layer.jsing2021-08-301-45/+36
* sync with OpenSSL 1.1.1, which is still under a free license;schwarze2021-08-301-15/+107
* Ignore warning alert returns from servername callback in TLSv1.3tb2021-08-301-3/+7
* Clean up and simplify ssl3_dispatch_alert() and ssl3_send_alert().jsing2021-08-281-30/+32
* SSL_CTX_remove_session() checks for a NULL session, avoid doing it twice.jsing2021-08-041-2/+2
* We have defines for alert levels - use them instead of magic numbers.jsing2021-07-312-7/+5
* Dedup dtls1_dispatch_alert()/ssl3_dispatch_alert().jsing2021-07-266-65/+26