summaryrefslogtreecommitdiff
path: root/src/lib (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Use the actual handshake message type in the certificate request handler.jsing2019-01-211-4/+2
* Move ssl_cipher_list_to_bytes() and ssl_bytes_to_cipher_list() totb2019-01-212-116/+120
* Provide the initial TLSv1.3 client implementation.jsing2019-01-215-25/+192
* Wire up the handshake message send and recv actions.jsing2019-01-212-4/+44
* In ssl_lib.c rev. 1.197, jsing@ added TLSv1.3 support to SSL_get_version(3).schwarze2019-01-211-2/+4
* The main handshake loop can be shared between client and server.jsing2019-01-212-29/+15
* Use ssl_cipher_is_permitted() in ssl_cipher_list_to_bytes().tb2019-01-211-9/+6
* Add ssl_cipher_is_permitted(), an internal helper function thattb2019-01-213-2/+49
* Correct some rwstate handling that I broke when refactoring.jsing2019-01-211-3/+13
* Provide TLS 1.3 cipher AEAD/hash and legacy I/O handling functions.jsing2019-01-213-2/+210
* Move struct tls13_ctx into a header since other things need access to it.jsing2019-01-213-21/+21
* Ensure we free TLS 1.3 handshake state.jsing2019-01-211-6/+11
* Teach ssl_version_string() about TLS1_3_VERSION.jsing2019-01-211-1/+3
* Store the record version and make it available for use.jsing2019-01-212-10/+21
* Fix header guardtb2019-01-201-2/+5
* Provide a handshake message handling implementation for TLS 1.3.jsing2019-01-203-3/+213
* Provide an initial implementation of the TLS 1.3 record layer.jsing2019-01-203-6/+790
* Provide a way to get just the record header.jsing2019-01-202-7/+33
* revert second hunk of previous that was committed by accidenttb2019-01-201-2/+2
* Add missing prototype for tls13_handshake_active_action().tb2019-01-201-2/+4
* include stdint.h over sys/types.hbcook2019-01-201-2/+2
* Add some internal consistency checks to the handshake state handling.jsing2019-01-201-9/+23
* TLS 1.3 clients always need to send the supported groups extension.jsing2019-01-201-4/+5
* Add an explicit flag to indicate a successful handshake insteadtb2019-01-201-8/+6
* Fix BN_is_prime_* calls in libcrypto, the API returns -1 on error.tb2019-01-203-18/+35
* spelling;jmc2019-01-191-2/+2
* In evp.h rev. 1.71, tb@ added EVP_ENCODE_CTX_new(3) andschwarze2019-01-191-4/+38
* Sort HDRS/SRCS lists and use one line per source file for maintainability.jsing2019-01-191-16/+44
* Add handshake message type checking and special case certificate requests.jsing2019-01-191-1/+30
* Tweak return value handling in the TLSv1.3 handshake code.jsing2019-01-192-44/+47
* Provide a TLS record handling implementation.jsing2019-01-193-2/+220
* bump minors after symbol additiontb2019-01-193-3/+3
* provide EVP_ENCODE_CTX_{new,free}().tb2019-01-193-2/+18
* $OpenBSD$tb2019-01-192-0/+2
* Partial port of EC_KEY_METHOD from OpenSSL 1.1.tb2019-01-193-12/+12
* Partial port of EC_KEY_METHOD from OpenSSL 1.1.tb2019-01-199-63/+213
* Partial port of EC_KEY_METHOD from OpenSSL 1.1.tb2019-01-1916-56/+659
* copyrightbeck2019-01-181-1/+2
* bump copyright years appopriatelybeck2019-01-181-3/+3
* Add client side of supported versions and keyshare extensions with basic regressbeck2019-01-184-4/+262
* Improve the description of locale dependency:schwarze2019-01-182-14/+20
* Replace the vague, incorrect, and confusing BUGS sections with CAVEATSschwarze2019-01-183-12/+33
* Expose some symbols in a new tls13_handshake.h for regression testing.tb2019-01-183-99/+93
* Remove this copy, we have decided we can do this in placebeck2019-01-183-1633/+2
* Add support for RFC 8446 section 4.2 enforcing which extensions maybeck2019-01-181-8/+43
* Rename TLS extension handling to use less "hello".jsing2019-01-184-220/+228
* Get rid of is_serverhello in preparation for other messagesbeck2019-01-171-13/+24
* Provide an extensible buffer implementation that uses a read callback.jsing2019-01-173-3/+148
* Add support to enforce restrictions on where extensions can appearbeck2019-01-172-12/+38
* Add a direct copy of the exension parsing code to be modified for tls13.beck2019-01-173-2/+1596