summaryrefslogtreecommitdiff
path: root/src (unfollow)
Commit message (Expand)AuthorFilesLines
2020-01-25Revert change to certificate request check from r1.45.jsing1-3/+3
2020-01-25Only perform the downgrade check if our max version is less than TLSv1.3.jsing1-15/+17
2020-01-25Preserve the transcript hash for the client finished message,beck1-2/+3
2020-01-25Support legacy message callbacks. First step for SSL_set_msg_callback(3)tb3-3/+40
2020-01-25Correct value for SSL_TLSEXT_MSG_HRR.jsing1-2/+2
2020-01-25Only discard the extension block for client hello and server hellojsing1-2/+3
2020-01-25Only send an RI extension for pre-TLSv1.3 versions.jsing1-2/+2
2020-01-25It is possible to receive a pre-TLSv1.3 alert in response to a TLSv1.3jsing3-4/+24
2020-01-25Correct backwards test so that we may accept a certificate requstbeck1-3/+3
2020-01-25add a couple of XXX for future cleanuptb1-1/+4
2020-01-25Disable the client hello message regress test for now.jsing1-2/+2
2020-01-25Ensure that TLSv1.0 and TLSv1.1 are enabled before running SSLv2 clientjsing1-5/+10
2020-01-24Teach openssl s_client a bit about TLSv1.3.tb1-2/+17
2020-01-24Complete the initial TLSv1.3 implementation.jsing3-14/+300
2020-01-24Preserve the TLS transcript at additional points.jsing1-9/+23
2020-01-24Permit 0 length writes, because openssl s_client is specialbeck1-2/+2
2020-01-24Store the legacy session identifier from the ClientHello so we can actuallyjsing1-1/+10
2020-01-24Switch to encrypted records in the TLSv1.3 server.jsing3-4/+78
2020-01-24Enable SSL_ENC_FLAG_SIGALGS on TLSv1_3_enc_data.jsing1-2/+2
2020-01-24Add strings for SSL_aTLS1_3 and SSL_kTLS1_3 to SSL_CIPHER_description().jsing1-1/+7
2020-01-24Fix breakage in SSL_connect, SSL_accept, etc. by not propagatingbeck3-13/+42
2020-01-23Implement client hello processing in the TLSv1.3 server.jsing3-10/+58
2020-01-23Correct several issues in the current TLSv1.3 server code.jsing1-6/+15
2020-01-23When certificate validation fails, we must send a DECRYPT_ERROR alertbeck1-3/+6
2020-01-23Remove the ssl_get_message function pointer from SSL_METHOD_INTERNAL.jsing6-47/+27
2020-01-23Implement sending client certificate requests for 1.3 serverbeck1-1/+13
2020-01-23Correctly handle TLSv1.3 ciphers suites in ssl3_choose_cipher().jsing4-5/+30
2020-01-23Build the encrypted extensions for the 1.3 serverbeck1-2/+8
2020-01-23If we are building a legacy server hello, check to see if we arebeck1-1/+20
2020-01-23Add checking int the client to check the magic values which arebeck3-3/+30
2020-01-23Add code to build and send a server hello for tls 1.3beck1-3/+40
2020-01-23Save the legacy session id in the client, and enforce that it is returnedbeck2-7/+18
2020-01-23Implement pending for TLSv1.3.jsing4-6/+42
2020-01-23The X509_LOOKUP code tries to grope around in /etc/ssl/cert/ to findtb1-30/+67
2020-01-23Remove lies from the SSL_pending man page, Our implementation neverbeck1-22/+3
2020-01-23Make -peekaboo mode also use SSL_pending after peeking, to ensurebeck1-2/+9
2020-01-23Switch back to a function pointer for ssl_pending.jsing3-14/+24
2020-01-23Add a TLS13_IO_ALERT return value so that we can explicitly signal whenjsing3-11/+22
2020-01-23Pass a CBB to TLSv1.3 send handlers.jsing4-50/+44
2020-01-22The length of the IV of EVP_chacha20 is currently 64 bits, not 96.tb1-3/+3
2020-01-22Wire up the TLSv1.3 server.jsing3-6/+182
2020-01-22Pass a handshake message content CBS to TLSv1.3 receive handlers.jsing5-85/+70
2020-01-22Fix things so that `make -DTLS1_3` works again.jsing1-1/+3
2020-01-22Send alerts on certificate verification failures of server certsbeck1-2/+2
2020-01-22Rename failure into alert_desc in tlsext_ocsp_server_parse().tb1-5/+5
2020-01-22fix previous: alert_desc needs to be an int.tb1-2/+2
2020-01-22Avoid modifying alert in the success path.tb1-11/+17
2020-01-22Enable the TLSv1.3 client in libssl.jsing1-2/+3
2020-01-22Correct includes check for libtls.jsing1-2/+2
2020-01-22Add checks to ensure that lib{crypto,ssl,tls} public headers have actuallyjsing3-3/+33