summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Implement support for SSL_peek() in the TLSv1.3 record layer.jsing2020-01-223-14/+39
* After the ClientHello has been sent or received and before the peer'stb2020-01-224-8/+22
* Correctly set the legacy version when TLSv1.3 is building a client hello.jsing2020-01-221-4/+11
* Don't add an extra unknown error if we got a fatal alertbeck2020-01-221-2/+3
* The legacy_record_version must be set to TLS1_2_VERSION excepttb2020-01-224-9/+30
* Hook up the TLSv1.3 legacy shutdown code.jsing2020-01-221-2/+2
* Add minimal support for hello retry request for RFC conformance.beck2020-01-224-11/+71
* Split the TLSv1.3 guards into separate client and server guards.jsing2020-01-223-6/+13
* Implement close-notify and SSL_shutdown() handling for the TLSv1.3 client.jsing2020-01-223-9/+76
* Correct legacy fallback for TLSv1.3 client.jsing2020-01-213-9/+30
* Provide SSL_R_UNKNOWN.jsing2020-01-213-5/+7
* Clear and free the tls13_ctx that hangs off an SSL *s fromtb2020-01-212-2/+8
* Add alert processing in tls client code, by adding alert to thebeck2020-01-213-19/+30
* Add alerts to the tls 1.3 record layer and handshake layerbeck2020-01-202-49/+29
* Provide an error framework for use with the TLSv1.3 code.jsing2020-01-205-7/+151
* In ssl.h rev. 1.167 and s3_lib.c rev. 1.188, jsing@ providedschwarze2020-01-021-4/+21
* Revise SSL_CTX_get_extra_chain_certs() to match OpenSSL behaviour.jsing2020-01-022-8/+23
* Provide TLSEXT_TYPE_* aliases for TLS 1.3.jsing2020-01-021-1/+10
* spelling; from bryan stensonjmc2019-12-191-3/+3
* Fix typo: ECHD -> ECDH.tb2019-12-031-4/+4
* Add support for TLS 1.3 post handshake messages and key updating.beck2019-11-263-20/+217
* Add accessors to change the buffer in a handshake message.beck2019-11-203-3/+20
* Add prototypes for the functions that update application secretsbeck2019-11-181-1/+3
* Provide a clean interface for sending TLSv1.3 alerts.jsing2019-11-182-5/+17
* Change tls13_record_layer_phh() to take a CBS as this avoids ownershipjsing2019-11-172-8/+6
* Correct update of application traffic secrets to use an empty contextbeck2019-11-171-3/+7
* Bring back the ssl_shutdown internal method pointer.jsing2019-11-173-4/+21
* Add a reference for the non-standard post-handshake handshake (PHH).tb2019-11-171-2/+2
* Ensure that we are never operating in plaintext mode once the handshakejsing2019-11-171-1/+7
* Provide framework for sending alerts and post-handshake handshake messages.jsing2019-11-172-15/+174
* indent with a tab instead of 8 spacestb2019-11-171-2/+2
* Move the TLSv1.3 server message handling stubs.jsing2019-11-172-125/+125
* Add the initial framework for the TLSv1.3 server.jsing2019-11-173-3/+84
* tls13_connect() should be static.jsing2019-11-171-2/+2
* Fix backoff to legacy when in client auth mode.beck2019-11-171-2/+2
* Drop back to the legacy tls method if we are doing client authenticaitonbeck2019-11-171-1/+7
* Separate the callbacks for recieved and completed post handshake messagesbeck2019-11-173-10/+22
* Revert previous deduplication diff, I broke portable in a strange way.beck2019-11-161-47/+58
* Deduplicate some extension processing code.beck2019-11-151-58/+47
* Add missing cross-reference to NOTES section.millert2019-11-141-3/+3
* Allow ip addresses as argument to SSL_set1_host() but be careful to nototto2019-11-041-2/+14
* Bump libcrypto, libssl and libtls minors due to symbol additions.jsing2019-11-021-1/+1
* Bump libcrypto, libssl and libtls majors due to changes in struct sizesjsing2019-10-241-2/+2
* Use a valid curve when constructing an EC_KEY that looks like X25519.jsing2019-10-041-2/+3
* Further improve the documentation of library initialization and configuration.schwarze2019-06-143-37/+37
* add missing backlinks to ssl(3)schwarze2019-06-1231-64/+100
* List all 17 SSL pages that were missing.schwarze2019-06-121-51/+89
* remove pointless NOTES section header linesschwarze2019-06-089-27/+27
* provide getters and setters for the RSA_METHOD interfacegilles2019-06-051-1/+1
* Relax parsing of TLS key share extensions on the server.jsing2019-05-291-5/+2