summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Remove unused fields from struct dtls1_retransmit_state.jsing2021-10-231-3/+1
* Fold DTLS1_STATE_INTERNAL into DTLS1_STATE.jsing2021-10-238-171/+154
* tweak previous: properly mark up function pointer typedefschwarze2021-10-231-6/+18
* Change ssl_verify_cert_chain() for compatibility with opaquetb2021-10-231-16/+19
* Use X509_STORE_CTX_get0_chain() instead of grabbing the chain directlytb2021-10-232-4/+4
* Rename tls13_buffer to tls_buffer.jsing2021-10-237-69/+111
* Add SSL_CTX_set_keylog_callback and SSL_CTX_get_keylog_callbackbeck2021-10-235-4/+67
* Untangle ssl3_get_message() return values.jsing2021-10-236-166/+139
* Change tlsext_tick_lifetime_hint to uint32_t.jsing2021-10-234-17/+11
* Avoid potential NULL dereferences in dtls1_free()tb2021-10-211-2/+7
* Move various structs from ssl.h/tls1.h to ssl_locl.h.jsing2021-10-153-140/+128
* Implement flushing for TLSv1.3 handshakes.jsing2021-09-165-7/+69
* Avoid typedef redefinitionlibressl-v3.4.0inoguchi2021-09-141-3/+1
* zap trailing white spacetb2021-09-141-2/+2
* Call the info cb on connect/accept exit in TLSv1.3tb2021-09-142-4/+16
* provide a small manual page for the SSL_set_psk_use_session_callback(3)schwarze2021-09-142-1/+88
* Merge the stub SSL_SESSION_is_resumable(3) manual page from theschwarze2021-09-143-3/+86
* merge the description of SSL_get_tlsext_status_type(3)schwarze2021-09-111-3/+35
* bump major after symbol addition and struct removal, struct visibilitytb2021-09-101-1/+1
* Update Symbols.list after API additionstb2021-09-101-0/+18
* Move SSL_set0_rbio() outside of LIBRESSL_HAS_TLS1_3tb2021-09-101-3/+1
* Expose SSL_get_tlext_status_type() in tls1.htb2021-09-101-3/+1
* Expose SSL_R_NO_APPLICATION_PROTOCOL in ssl.htb2021-09-101-3/+1
* Expose SSL_CTRL_GET_TLSEXT_STATUS_REQ_TYPE in ssl.htb2021-09-101-3/+1
* Expose SSL_CTX_get0_privatekey() in ssl.htb2021-09-101-3/+1
* Remove TLS1_get_{,client_}version()tb2021-09-101-9/+1
* Remove SSL3_RECORD and SSL3_BUFFERtb2021-09-101-25/+1
* Remove TLS1_RT_HEARTBEATtb2021-09-101-2/+1
* Make SSL opaquetb2021-09-101-2/+4
* Remove struct tls_session_ticket_ext_st and TLS_SESSION_TICKET_EXTtb2021-09-102-2/+6
* Do not ignore SSL_TLSEXT_ERR_FATAL from the ALPN callbacktb2021-09-104-7/+31
* Prepare to provide SSL_CTX_get0_privatekey()tb2021-09-102-2/+14
* Provide SSL_SESSION_is_resumable and SSL_set_psk_use_session_callback stubstb2021-09-083-3/+24
* Prepare to provide API stubs for PHAtb2021-09-082-2/+27
* Prepare to provide SSL_get_tlsext_status_type()tb2021-09-083-3/+20
* Prepare to provide SSL_set0_rbio()tb2021-09-082-2/+12
* Factor out the TLSv1.3 code that handles content from TLS records.jsing2021-09-046-80/+238
* Refactor ssl_update_cache. This now matches the logic used for TLS 1.3beck2021-09-041-22/+106
* Improve DTLS hello request handling code.jsing2021-09-041-2/+8
* Change dtls1_get_message_header() to take a CBS.jsing2021-09-043-22/+21
* Improve DTLS record header parsing.jsing2021-09-041-7/+7
* Use SSL3_HM_HEADER_LENGTH instead of the magic number 4.jsing2021-09-031-13/+14
* Ensure that a server hello does not have trailing data.jsing2021-09-031-1/+4
* Ensure that a client hello does not have trailing data.jsing2021-09-031-1/+4
* Set message_size correctly when switching to the legacy stack.jsing2021-09-031-2/+2
* We need to allow for either a CERTIFICATE or CERTIFICATE_STATUS messagebeck2021-09-021-2/+3
* Call the ocsp callback if present and we get no response, instead ofbeck2021-09-021-3/+2
* Correct the is_server flag in the call to the debug callback to be correct.beck2021-09-021-2/+2
* RFC 6066 section 8 allows the server MAY choose not send the CertificateStatusbeck2021-09-021-3/+37
* comment out the detailed description of SSL_get_servername(3),schwarze2021-09-011-7/+9