summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Remove static from handshakes[][] so it is visible from regress/tb2019-01-231-2/+2
* No need to include <bsd.prog.mk> here.tb2019-01-231-2/+1
* bump minors after symbol additiontb2019-01-221-1/+1
* Document SSL_get1_supported_ciphers(3) and SSL_get_client_ciphers(3).tb2019-01-221-7/+61
* Add a re-implementation of SSL_get1_supported_ciphers().tb2019-01-223-2/+38
* Provide SSL_get_client_ciphers().tb2019-01-223-2/+12
* Use the actual handshake message type in the certificate request handler.jsing2019-01-211-4/+2
* Move ssl_cipher_list_to_bytes() and ssl_bytes_to_cipher_list() totb2019-01-212-116/+120
* Provide the initial TLSv1.3 client implementation.jsing2019-01-215-25/+192
* Wire up the handshake message send and recv actions.jsing2019-01-212-4/+44
* In ssl_lib.c rev. 1.197, jsing@ added TLSv1.3 support to SSL_get_version(3).schwarze2019-01-211-2/+4
* The main handshake loop can be shared between client and server.jsing2019-01-212-29/+15
* Use ssl_cipher_is_permitted() in ssl_cipher_list_to_bytes().tb2019-01-211-9/+6
* Add ssl_cipher_is_permitted(), an internal helper function thattb2019-01-213-2/+49
* Correct some rwstate handling that I broke when refactoring.jsing2019-01-211-3/+13
* Provide TLS 1.3 cipher AEAD/hash and legacy I/O handling functions.jsing2019-01-213-2/+210
* Move struct tls13_ctx into a header since other things need access to it.jsing2019-01-213-21/+21
* Ensure we free TLS 1.3 handshake state.jsing2019-01-211-6/+11
* Teach ssl_version_string() about TLS1_3_VERSION.jsing2019-01-211-1/+3
* Store the record version and make it available for use.jsing2019-01-212-10/+21
* Fix header guardtb2019-01-201-2/+5
* Provide a handshake message handling implementation for TLS 1.3.jsing2019-01-203-3/+213
* Provide an initial implementation of the TLS 1.3 record layer.jsing2019-01-203-6/+790
* Provide a way to get just the record header.jsing2019-01-202-7/+33
* revert second hunk of previous that was committed by accidenttb2019-01-201-2/+2
* Add missing prototype for tls13_handshake_active_action().tb2019-01-201-2/+4
* Add some internal consistency checks to the handshake state handling.jsing2019-01-201-9/+23
* TLS 1.3 clients always need to send the supported groups extension.jsing2019-01-201-4/+5
* Add an explicit flag to indicate a successful handshake insteadtb2019-01-201-8/+6
* Sort HDRS/SRCS lists and use one line per source file for maintainability.jsing2019-01-191-16/+44
* Add handshake message type checking and special case certificate requests.jsing2019-01-191-1/+30
* Tweak return value handling in the TLSv1.3 handshake code.jsing2019-01-192-44/+47
* Provide a TLS record handling implementation.jsing2019-01-193-2/+220
* bump minors after symbol additiontb2019-01-191-1/+1
* copyrightbeck2019-01-181-1/+2
* bump copyright years appopriatelybeck2019-01-181-3/+3
* Add client side of supported versions and keyshare extensions with basic regressbeck2019-01-184-4/+262
* Expose some symbols in a new tls13_handshake.h for regression testing.tb2019-01-183-99/+93
* Remove this copy, we have decided we can do this in placebeck2019-01-183-1633/+2
* Add support for RFC 8446 section 4.2 enforcing which extensions maybeck2019-01-181-8/+43
* Rename TLS extension handling to use less "hello".jsing2019-01-184-220/+228
* Get rid of is_serverhello in preparation for other messagesbeck2019-01-171-13/+24
* Provide an extensible buffer implementation that uses a read callback.jsing2019-01-173-3/+148
* Add support to enforce restrictions on where extensions can appearbeck2019-01-172-12/+38
* Add a direct copy of the exension parsing code to be modified for tls13.beck2019-01-173-2/+1596
* Remove an ugly hack in the client certificate verification code that workstb2018-12-071-48/+44
* Send SSL_AD_DECODE alerts in the case of a bad hello request or antb2018-12-031-7/+7
* Refactor a tangle in ssl3_send_client_verify() into one function for eachtb2018-11-291-118/+213
* Fix DTLS transcript handling for HelloVerifyRequest.jsing2018-11-214-18/+26
* Revert previous - DTLSv1 uses MD5+SHA1 for RSA signature verification.jsing2018-11-192-10/+4