summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
* Ensure that a server hello does not have trailing data.jsing2021-09-031-1/+4
* Ensure that a client hello does not have trailing data.jsing2021-09-031-1/+4
* Set message_size correctly when switching to the legacy stack.jsing2021-09-031-2/+2
* We need to allow for either a CERTIFICATE or CERTIFICATE_STATUS messagebeck2021-09-021-2/+3
* Call the ocsp callback if present and we get no response, instead ofbeck2021-09-021-3/+2
* Correct the is_server flag in the call to the debug callback to be correct.beck2021-09-021-2/+2
* RFC 6066 section 8 allows the server MAY choose not send the CertificateStatusbeck2021-09-021-3/+37
* comment out the detailed description of SSL_get_servername(3),schwarze2021-09-011-7/+9
* Defragment DTLS.jsing2021-08-312-123/+48
* Remove a nonsensical s->version == TLS1_VERSION from DTLS code.jsing2021-08-311-6/+1
* Clean up and simplify info and msg callbacks.jsing2021-08-308-127/+88
* Replace DTLS r_epoch with the read epoch from the TLSv1.2 record layer.jsing2021-08-305-27/+26
* Move to an AEAD nonce allocated in the TLSv1.2 record layer.jsing2021-08-301-45/+36
* sync with OpenSSL 1.1.1, which is still under a free license;schwarze2021-08-301-15/+107
* Ignore warning alert returns from servername callback in TLSv1.3tb2021-08-301-3/+7
* Clean up and simplify ssl3_dispatch_alert() and ssl3_send_alert().jsing2021-08-281-30/+32
* SSL_CTX_remove_session() checks for a NULL session, avoid doing it twice.jsing2021-08-041-2/+2
* We have defines for alert levels - use them instead of magic numbers.jsing2021-07-312-7/+5
* Dedup dtls1_dispatch_alert()/ssl3_dispatch_alert().jsing2021-07-266-65/+26
* Remove DTLS processed_rcds queue.jsing2021-07-213-50/+22
* Silently discard invalid DTLS records.jsing2021-07-211-4/+11
* Mop up dtls1_get_ccs_header() and struct ccs_header_st.jsing2021-07-193-21/+3
* Inline DTLS1_CCS_HEADER_LENGTH rather than having a single use variable.jsing2021-07-191-3/+2
* Do a first pass clean up of SSL_METHOD.jsing2021-07-034-103/+14
* Merge SSL_METHOD_INTERNAL into SSL_METHOD.jsing2021-07-0115-195/+126
* Prepare to provide SSL_get_signature_nid() and friends.jsing2021-06-302-2/+81
* Move some structs from public to private headers.jsing2021-06-303-125/+108
* Correct sigalg hash usage when signing content for client verify.jsing2021-06-301-3/+2
* Pull sigalg selection up into ssl3_send_client_verify().jsing2021-06-291-14/+11
* Track sigalg used by ourselves and our peer in the legacy stack.jsing2021-06-292-2/+6
* Pull up and dedup the TLS version check in ssl_sigalg_pkey_ok().jsing2021-06-291-5/+6
* Simplify RSA PSS key size comment.jsing2021-06-291-5/+2
* Use appropriate TLS version when building client sigalg extensions.jsing2021-06-291-2/+6
* Change ssl_sigalg_from_value() to take SSL * instead of a TLS version.jsing2021-06-291-7/+6
* Make various sigalg functions static now that they're only used internally.jsing2021-06-292-10/+5
* Convert legacy stack server to ssl_sigalg_for_peer().jsing2021-06-291-47/+29
* Convert legacy stack client to ssl_sigalg_for_peer().jsing2021-06-291-34/+12
* Provide a ssl_sigalg_for_peer() function and use in the TLSv1.3 code.jsing2021-06-294-15/+33
* Move the RSA-PSS check for TLSv1.3 to ssl_sigalg_pkey_ok().jsing2021-06-296-34/+29
* Factor out handling of legacy default signature algorithms.jsing2021-06-291-32/+27
* Mop up now unused variables.jsing2021-06-291-7/+2
* Require a ServerHello following a HelloRetryRequest to use the same cipher.jsing2021-06-291-2/+11
* Reject zero-length non-application data fragments in the legacy stack.jsing2021-06-291-1/+11
* Use the order action->sender == ctx->mode everywhere for consistency.tb2021-06-281-3/+3
* ctx->alert is not a boolean, so compare it explicitly against 0.tb2021-06-281-3/+3
* The state machine now takes care of setting the legacy state,tb2021-06-281-11/+1
* Expand info callback support for TLSv1.3tb2021-06-282-7/+187
* Track the sigalgs used by ourselves and our peer.jsing2021-06-273-9/+14
* Have ssl3_send_client_verify() pass *pkey to called functions.jsing2021-06-271-22/+11
* Change ssl_sigalgs_from_value() to perform sigalg list selection.jsing2021-06-276-32/+31