summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Sync CBS_strdup() documentation update from libcrypto.jsing2022-11-091-6/+4
* Rewrite TLSv1.2 key exporter.jsing2022-11-075-96/+163
* Move tls13_exporter() code.jsing2022-11-072-72/+73
* Add extra NULL check after ssl3_setup_read_buffer()tb2022-10-211-2/+5
* Initial parsing of the NewSessionTicket messagetb2022-10-201-2/+103
* Provide TLS13_MAX_TICKET_LIFETIME #definetb2022-10-201-1/+8
* Provide ssl_session_dup()tb2022-10-202-2/+108
* Clean up resumption master secret in SSL_SESSION_free()tb2022-10-201-1/+3
* Extend SSL_SESSION struct for TLSv1.3 PSKtb2022-10-201-2/+4
* Annotate misuse of EVP_Digest()tb2022-10-201-1/+2
* Error out if the out secret wasn't properly initializedtb2022-10-141-2/+6
* unwrap two lines for readabilitytb2022-10-051-5/+3
* Get rid of SSL_CTX_INTERNAL and SSL_INTERNAL.jsing2022-10-0226-1237/+1220
* Move handshake message handling functions from ssl_both.c to client/server.jsing2022-10-014-225/+342
* Allow TLSv1.3 clients to send CCS without middlebox compatibility mode.jsing2022-09-171-4/+2
* Link to SSL_read_early_data(3)kn2022-09-171-3/+3
* Enforce the minimum TLS version requirement for QUIC.jsing2022-09-111-1/+9
* Crank major after symbol addition and libcrypto major bumptb2022-09-111-2/+2
* Update Symbols.listtb2022-09-111-0/+11
* Expose SSL_get_share_{group,curve}() and related #definestb2022-09-111-7/+3
* Expose some error codes needed for QUIC supporttb2022-09-111-3/+1
* Be stricter with middlebox compatibility mode in the TLSv1.3 server.jsing2022-09-111-5/+21
* Only permit CCS messages if requesting middlebox compatibility mode.jsing2022-09-111-4/+4
* Use CBS when procesing a CCS message in the legacy stack.jsing2022-09-111-4/+7
* Ensure there is no trailing data for a CCS received by the TLSv1.3 stack.jsing2022-09-111-1/+3
* Use CBS to parse TLS alerts in the legacy stack.jsing2022-09-101-4/+10
* Provide a version of ssl_msg_callback() that takes a CBS.jsing2022-09-103-8/+17
* fix repeated wordsjsg2022-09-101-3/+3
* ssl_cipher_process_rulestr: return early if a cipher command is invalidmillert2022-09-081-5/+2
* ssl_cipher_process_rulestr: don't read outside rule_str buffermillert2022-09-071-2/+3
* Make ssl_create_cipher_list() have a single exittb2022-09-041-23/+23
* Check sk_SSL_CIPHER_push() return valuetb2022-09-011-4/+11
* Recommit -r1.45 but without error checking EVP_PKEY_copy_parameters()tb2022-08-311-4/+12
* Revert r1.46. Causes fireworks in regress.tb2022-08-311-9/+5
* Avoid potential NULL dereference in ssl_set_pkey()tb2022-08-311-5/+9
* Remove a commented-out sk_push that has been hanging around for > 20 yearstb2022-08-301-4/+1
* Plug leak of BIO in tls13_quic_init()tb2022-08-301-2/+1
* Handle SSL_do_handshake() being called before SSL_provide_quic_data().jsing2022-08-271-1/+4
* Provide the remaining QUIC API.jsing2022-08-212-2/+149
* Wire up SSL_QUIC_METHOD callbacks to the record layer callbacks for QUIC.jsing2022-08-213-19/+59
* Provide SSL_QUIC_METHOD.jsing2022-08-213-9/+172
* Provide and use QUIC specific error reasons.jsing2022-08-213-5/+9
* Ensure that SSL_{peek,read,write}() are not called if QUIC is in use.jsing2022-08-211-1/+16
* Prepare to provide SSL_ERROR_WANT_{ASYNC,ASYNC_JOB,CLIENT_HELLO_CB}jsing2022-08-211-10/+15
* zap a tabtb2022-08-201-2/+2
* Tweak prototype to match function definition (n -> index)tb2022-08-181-2/+2
* Implement the SSL_CTRL_GET_SHARED_GROUP controltb2022-08-171-1/+37
* Refactor tls1_get_supported_group()tb2022-08-172-30/+99
* Add SSL_get_shared_{curve,group}()tb2022-08-171-2/+10
* Make tls1_get_{format,group_}list() take a const SSLtb2022-08-172-8/+8