summaryrefslogtreecommitdiff
path: root/src/lib (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Implement pending for TLSv1.3.jsing2020-01-234-6/+42
* Remove lies from the SSL_pending man page, Our implementation neverbeck2020-01-231-22/+3
* Switch back to a function pointer for ssl_pending.jsing2020-01-233-14/+24
* Add a TLS13_IO_ALERT return value so that we can explicitly signal whenjsing2020-01-233-11/+22
* Pass a CBB to TLSv1.3 send handlers.jsing2020-01-234-50/+44
* The length of the IV of EVP_chacha20 is currently 64 bits, not 96.tb2020-01-221-3/+3
* Wire up the TLSv1.3 server.jsing2020-01-223-6/+182
* Pass a handshake message content CBS to TLSv1.3 receive handlers.jsing2020-01-225-85/+70
* Fix things so that `make -DTLS1_3` works again.jsing2020-01-221-1/+3
* Send alerts on certificate verification failures of server certsbeck2020-01-221-2/+2
* Rename failure into alert_desc in tlsext_ocsp_server_parse().tb2020-01-221-5/+5
* fix previous: alert_desc needs to be an int.tb2020-01-221-2/+2
* Avoid modifying alert in the success path.tb2020-01-221-11/+17
* Enable the TLSv1.3 client in libssl.jsing2020-01-221-2/+3
* Correct includes check for libtls.jsing2020-01-221-2/+2
* Add checks to ensure that lib{crypto,ssl,tls} public headers have actuallyjsing2020-01-223-3/+33
* delete wasteful ;;deraadt2020-01-221-2/+2
* Move guards from public to internal headers, and fix not use values.beck2020-01-222-8/+7
* Simplify header installation by combining the HDRS and HDRS_GEN loops.jsing2020-01-221-9/+2
* Note in the man page that the default protocols list includes 1.3beck2020-01-221-4/+4
* Enable TLS version 1.3 in the default protocols for libtls.beck2020-01-221-2/+2
* Implement support for SSL_peek() in the TLSv1.3 record layer.jsing2020-01-223-14/+39
* After the ClientHello has been sent or received and before the peer'stb2020-01-224-8/+22
* Correctly set the legacy version when TLSv1.3 is building a client hello.jsing2020-01-221-4/+11
* Don't add an extra unknown error if we got a fatal alertbeck2020-01-221-2/+3
* The legacy_record_version must be set to TLS1_2_VERSION excepttb2020-01-224-9/+30
* Hook up the TLSv1.3 legacy shutdown code.jsing2020-01-221-2/+2
* Add minimal support for hello retry request for RFC conformance.beck2020-01-224-11/+71
* Split the TLSv1.3 guards into separate client and server guards.jsing2020-01-223-6/+13
* Implement close-notify and SSL_shutdown() handling for the TLSv1.3 client.jsing2020-01-223-9/+76
* Correct legacy fallback for TLSv1.3 client.jsing2020-01-213-9/+30
* Remove redundant ASN1_INTEGER_set call in PKCS7_set_typeinoguchi2020-01-211-2/+1
* Provide SSL_R_UNKNOWN.jsing2020-01-213-5/+7
* Clear and free the tls13_ctx that hangs off an SSL *s fromtb2020-01-212-2/+8
* Add alert processing in tls client code, by adding alert to thebeck2020-01-213-19/+30
* Add alerts to the tls 1.3 record layer and handshake layerbeck2020-01-202-49/+29
* Provide an error framework for use with the TLSv1.3 code.jsing2020-01-205-7/+151
* Add support for TLSv1.3 as a protocol to libtls.jsing2020-01-204-11/+20
* Free pss in RSA_freeinoguchi2020-01-171-1/+2
* bump to 3.1.0bcook2020-01-141-3/+3
* Document how to make getopt_long(3) process arguments in order and stopstsp2020-01-131-2/+18
* Avoid leak in error path of PKCS5_PBE_keyivgeninoguchi2020-01-121-1/+2
* Avoid leak in error path of asn1_parse2inoguchi2020-01-091-17/+21
* Avoid leak in error path of dh_priv_decodeinoguchi2020-01-041-1/+2
* In ssl.h rev. 1.167 and s3_lib.c rev. 1.188, jsing@ providedschwarze2020-01-021-4/+21
* Revise SSL_CTX_get_extra_chain_certs() to match OpenSSL behaviour.jsing2020-01-022-8/+23
* Provide TLSEXT_TYPE_* aliases for TLS 1.3.jsing2020-01-021-1/+10
* drand48(3) returns values in [0.0, 1.0).tb2019-12-201-3/+3
* spelling; from bryan stensonjmc2019-12-191-3/+3
* Fix documented signatures of HMAC(3) and HMAC_Update(3). The n and lentb2019-12-141-4/+4