summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Only send an RI extension for pre-TLSv1.3 versions.jsing2020-01-251-2/+2
* It is possible to receive a pre-TLSv1.3 alert in response to a TLSv1.3jsing2020-01-253-4/+24
* Correct backwards test so that we may accept a certificate requstbeck2020-01-251-3/+3
* add a couple of XXX for future cleanuptb2020-01-251-1/+4
* Disable the client hello message regress test for now.jsing2020-01-251-2/+2
* Ensure that TLSv1.0 and TLSv1.1 are enabled before running SSLv2 clientjsing2020-01-251-5/+10
* Teach openssl s_client a bit about TLSv1.3.tb2020-01-241-2/+17
* Complete the initial TLSv1.3 implementation.jsing2020-01-243-14/+300
* Preserve the TLS transcript at additional points.jsing2020-01-241-9/+23
* Permit 0 length writes, because openssl s_client is specialbeck2020-01-241-2/+2
* Store the legacy session identifier from the ClientHello so we can actuallyjsing2020-01-241-1/+10
* Switch to encrypted records in the TLSv1.3 server.jsing2020-01-243-4/+78
* Enable SSL_ENC_FLAG_SIGALGS on TLSv1_3_enc_data.jsing2020-01-241-2/+2
* Add strings for SSL_aTLS1_3 and SSL_kTLS1_3 to SSL_CIPHER_description().jsing2020-01-241-1/+7
* Fix breakage in SSL_connect, SSL_accept, etc. by not propagatingbeck2020-01-243-13/+42
* Implement client hello processing in the TLSv1.3 server.jsing2020-01-233-10/+58
* Correct several issues in the current TLSv1.3 server code.jsing2020-01-231-6/+15
* When certificate validation fails, we must send a DECRYPT_ERROR alertbeck2020-01-231-3/+6
* Remove the ssl_get_message function pointer from SSL_METHOD_INTERNAL.jsing2020-01-236-47/+27
* Implement sending client certificate requests for 1.3 serverbeck2020-01-231-1/+13
* Correctly handle TLSv1.3 ciphers suites in ssl3_choose_cipher().jsing2020-01-234-5/+30
* Build the encrypted extensions for the 1.3 serverbeck2020-01-231-2/+8
* If we are building a legacy server hello, check to see if we arebeck2020-01-231-1/+20
* Add checking int the client to check the magic values which arebeck2020-01-233-3/+30
* Add code to build and send a server hello for tls 1.3beck2020-01-231-3/+40
* Save the legacy session id in the client, and enforce that it is returnedbeck2020-01-232-7/+18
* Implement pending for TLSv1.3.jsing2020-01-234-6/+42
* The X509_LOOKUP code tries to grope around in /etc/ssl/cert/ to findtb2020-01-231-30/+67
* Remove lies from the SSL_pending man page, Our implementation neverbeck2020-01-231-22/+3
* Make -peekaboo mode also use SSL_pending after peeking, to ensurebeck2020-01-231-2/+9
* Switch back to a function pointer for ssl_pending.jsing2020-01-233-14/+24
* Add a TLS13_IO_ALERT return value so that we can explicitly signal whenjsing2020-01-233-11/+22
* Pass a CBB to TLSv1.3 send handlers.jsing2020-01-234-50/+44
* The length of the IV of EVP_chacha20 is currently 64 bits, not 96.tb2020-01-221-3/+3
* Wire up the TLSv1.3 server.jsing2020-01-223-6/+182
* Pass a handshake message content CBS to TLSv1.3 receive handlers.jsing2020-01-225-85/+70
* Fix things so that `make -DTLS1_3` works again.jsing2020-01-221-1/+3
* Send alerts on certificate verification failures of server certsbeck2020-01-221-2/+2
* Rename failure into alert_desc in tlsext_ocsp_server_parse().tb2020-01-221-5/+5
* fix previous: alert_desc needs to be an int.tb2020-01-221-2/+2
* Avoid modifying alert in the success path.tb2020-01-221-11/+17
* Enable the TLSv1.3 client in libssl.jsing2020-01-221-2/+3
* Correct includes check for libtls.jsing2020-01-221-2/+2
* Add checks to ensure that lib{crypto,ssl,tls} public headers have actuallyjsing2020-01-223-3/+33
* delete wasteful ;;deraadt2020-01-221-2/+2
* Move guards from public to internal headers, and fix not use values.beck2020-01-222-8/+7
* Simplify header installation by combining the HDRS and HDRS_GEN loops.jsing2020-01-221-9/+2
* Note in the man page that the default protocols list includes 1.3beck2020-01-221-4/+4
* Enable TLS version 1.3 in the default protocols for libtls.beck2020-01-221-2/+2
* Simplify the peekaboo code.jsing2020-01-221-35/+6