summaryrefslogtreecommitdiff
path: root/src/lib (follow)
Commit message (Expand)AuthorAgeFilesLines
* Refactor do_ssl3_write().jsing2020-02-191-97/+98
* drop unused include <openssl/curve25519.h>tb2020-02-184-10/+4
* Describe the restriction for length of openssl conf value stringinoguchi2020-02-171-2/+4
* Restrict the length of openssl conf value stringinoguchi2020-02-173-5/+14
* Avoid potential NULL dereference when parsing a server keyshare extension.jsing2020-02-161-1/+4
* Avoid leak for tmp.x25519inoguchi2020-02-162-5/+11
* Move the TLSv1.3 code that interfaces with the legacy APIs/stack into ajsing2020-02-153-309/+330
* Remove #include that is not needed.jsing2020-02-151-3/+1
* correct Research Unix edition "appeared in" use in HISTORYjsg2020-02-081-3/+3
* Re-enable the TLSv1.3 client since the known issues have been addressed.jsing2020-02-061-3/+1
* Add a workaround to make SSL_set_session() work with TLSv1.3.jsing2020-02-061-1/+9
* Add support for handling hello retry requests in the TLSv1.3 client.jsing2020-02-061-5/+100
* Correctly handle key share extensions in a hello retry request.jsing2020-02-062-4/+11
* Refactor the server hello processing code in the TLSv1.3 client.jsing2020-02-052-22/+46
* Remove the hello retry request processing code that was previously added.jsing2020-02-052-65/+16
* Provide tls1_transcript_unfreeze() to avoid the need for manual flagsjsing2020-02-052-3/+10
* Pull the handshake message transcript code into its own function.jsing2020-02-052-7/+14
* Rework tls13_legacy_handshake_message_{recv,sent}_cb() to usetb2020-02-053-16/+22
* Add support for TLSv1.3 key shares with secp256r1 and secp384r1 groups.jsing2020-02-041-5/+98
* Free the transcript as soon as we initialise the transcript hash.jsing2020-02-042-2/+4
* Correctly unpack client key shares.jsing2020-02-012-14/+11
* Disable TLSv1.3 client while some known issues are being addressed.jsing2020-02-011-1/+3
* Provide struct/functions for handling TLSv1.3 key shares.jsing2020-01-308-130/+299
* Factor out/rewrite the ECDHE EC point key exchange code.jsing2020-01-305-173/+188
* Remove dead prototypes.jsing2020-01-291-10/+1
* If the TLSv1.3 code has not recorded an error and something already existsjsing2020-01-293-3/+9
* Remove unused stub implementation of tls13_accept(). The correcttb2020-01-291-11/+1
* Fix SSL_CIPHER_descriptioninoguchi2020-01-261-2/+2
* Avoid 32 bit right shift with unsigned int in crypto/cast/cast_lcl.hinoguchi2020-01-261-2/+2
* tweak previous; ok tbjmc2020-01-261-3/+3
* typotb2020-01-261-2/+2
* Document the change in EVP_chacha20(3).tb2020-01-261-3/+5
* Improve the comment explaining why the previous change matches OpenSSL'stb2020-01-261-8/+15
* When an SSL method is set, bump the max version back to that of thejsing2020-01-261-1/+10
* When switching back to a legacy client or server, ensure we reset thejsing2020-01-262-2/+4
* Fix basement bug where record layer would not correctly deal withbeck2020-01-261-1/+4
* Add server side support for requesting client certificates in tls 1.3beck2020-01-261-4/+173
* Add client certificate support for tls 1.3beck2020-01-262-15/+149
* Add sigalgs for server side to enable client certificate processingbeck2020-01-261-5/+34
* Move pad and verify context into tls13_lib.cbeck2020-01-264-68/+60
* Adjust EVP_chacha20()'s behavior to match OpenSSL's semantics:tb2020-01-261-7/+14
* Add an underbar for consistency.tb2020-01-251-2/+2
* Revert change to certificate request check from r1.45.jsing2020-01-251-3/+3
* Only perform the downgrade check if our max version is less than TLSv1.3.jsing2020-01-251-15/+17
* Preserve the transcript hash for the client finished message,beck2020-01-251-2/+3
* Support legacy message callbacks. First step for SSL_set_msg_callback(3)tb2020-01-253-3/+40
* Correct value for SSL_TLSEXT_MSG_HRR.jsing2020-01-251-2/+2
* Only discard the extension block for client hello and server hellojsing2020-01-251-2/+3
* Only send an RI extension for pre-TLSv1.3 versions.jsing2020-01-251-2/+2
* It is possible to receive a pre-TLSv1.3 alert in response to a TLSv1.3jsing2020-01-253-4/+24