summaryrefslogtreecommitdiff
path: root/src/lib (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Send alerts back correctly when handling key shares, includingbeck2020-05-171-8/+19
* Free handshake message correctly, noticed by tb@beck2020-05-171-2/+2
* As done everywhere else, use a local version of MINIMUM() and avoidderaadt2020-05-175-21/+21
* Send a decode error alert if a server provides an empty certificate list.jsing2020-05-171-2/+2
* Return TLS13_IO_WANT_POLLIN after processing post-handshake messages.jsing2020-05-161-2/+2
* Ensure that a TLSv1.3 server has provided a certificate.jsing2020-05-161-1/+9
* Add TLS13_ERR_NO_CERTIFICATE.jsing2020-05-162-3/+7
* Avoid sending an empty certificate list from the TLSv1.3 server.jsing2020-05-161-5/+8
* document PKCS7_set_type(3);schwarze2020-05-163-3/+123
* Fix pesky whitespace.jsing2020-05-131-2/+2
* Remove a no longer relevant XXX comment.jsing2020-05-131-3/+1
* Switch back to the legacy stack where the maximum is less than TLSv1.3.jsing2020-05-131-2/+2
* Switch the legacy version to TLS1_2_VERSION when processing server hello.jsing2020-05-131-2/+2
* there should only be one i in gratuitoustb2020-05-121-3/+3
* Enable the TLSv1.3 server.jsing2020-05-111-1/+5
* Propagate record overflows to the record layer and alert.jsing2020-05-113-6/+8
* Add record version checks.jsing2020-05-113-18/+28
* Set the record layer legacy version from the TLSv1.3 server.jsing2020-05-111-1/+5
* Provide an alert sent record layer callback.jsing2020-05-114-8/+29
* Move the record layer callbacks into a struct.jsing2020-05-113-35/+33
* Use ssl_get_new_session() in the TLSv1.3 server.jsing2020-05-111-4/+3
* Send dummy ChangeCipherSpec messages from the TLSv1.3 servertb2020-05-103-3/+41
* Honour SSL_VERIFY_FAIL_IF_NO_PEER_CERT in the TLSv1.3 server.jsing2020-05-103-8/+16
* Provide alert defines for TLSv1.3 and use in the TLSv1.3 code.jsing2020-05-107-65/+97
* Provide an easy way to get debug information from TLSv1.3 handshakes.jsing2020-05-102-3/+61
* Use size_t for OCSP response length.jsing2020-05-108-27/+35
* Only reset TLS extension state when parsing client hello or server hello.jsing2020-05-101-5/+7
* Correct tlsext_ocsp_resplen check.jsing2020-05-101-2/+2
* Back out server side CCS sending. It breaks TLSv1.3 client communicationtb2020-05-093-34/+3
* Forcibly ensure that only PSS may be used with RSA in TLS 1.3.beck2020-05-091-2/+8
* Send dummy ChangeCipherSpec messages from the TLSv1.3 servertb2020-05-093-3/+34
* Send dummy ChangeCipherSpec messages from the TLSv1.3 client.jsing2020-05-094-6/+45
* Correct return value check to handle TLS13_IO_EOF case.jsing2020-05-091-2/+2
* Add a middlebox_compat flag and condition session ID randomisation on it.jsing2020-05-093-4/+7
* catch the other place this needs to changebeck2020-05-091-2/+2
* now that 3.1.1 is out the door as a stable release bump the developmentbeck2020-05-091-2/+2
* Add support for certificate status requests in TLS 1.3 clientbeck2020-05-094-12/+81
* Make the test for the legacy_compression_method vector in the ClientHellotb2020-05-091-12/+7
* Drop a redundant test. It's effectively doing the same test twicetb2020-05-091-3/+2
* On receiving an overlong session ID terminate with an illegal_parametertb2020-05-091-1/+6
* Add support for HelloRetryRequests in the TLSv1.3 server.jsing2020-05-092-10/+73
* crazy whitespace on one linetb2020-05-091-2/+2
* Pull the sending of alerts up into tls13_handshake_perform().jsing2020-05-091-14/+11
* Refactor tls13_server_hello_sent().jsing2020-05-091-30/+36
* On receiving a handshake or alert record with empty inner plaintext,tb2020-05-071-1/+11
* Bump LibreSSL version to 3.1.1tb2020-05-061-3/+3
* Accept two ChangeCipherSpec messages during a TLSv1.3 handshake.jsing2020-05-031-3/+3
* Add const to TLS1.3 internal vectorsinoguchi2020-05-022-14/+14
* Disallow setting the AES-GCM IV length to 0tb2020-04-301-1/+5
* tls13_record_layer internal functions to static in libsslinoguchi2020-04-291-4/+4