summaryrefslogtreecommitdiff
path: root/lib/libssl/tls13_client.c
AgeCommit message (Expand)Author
2021-03-29Move finished and peer finished to the handshake struct.Joel Sing
2021-03-24Rename new_cipher to cipher.Joel Sing
2021-03-21Move the TLSv1.3 handshake struct inside the shared handshake struct.Joel Sing
2021-03-10Improve internal version handling.Joel Sing
2021-02-25Only use TLS versions internally (rather than both TLS and DTLS versions).Joel Sing
2021-02-22Fix bizarre punctuation and capitalization in a comment.Theo Buehler
2021-02-22Simplify version checks in the TLSv1.3 clientTheo Buehler
2021-01-06Use tls13_secret_{init,cleanup}() for the finished_keyTheo Buehler
2021-01-05Use consistent names in tls13_{client,server}_finished_{recv,send}().Joel Sing
2020-12-14Fix SSL_get{,_peer}_finished() with TLSv1.3Theo Buehler
2020-09-11Remove cipher_list_by_id.Joel Sing
2020-07-03Improve argument order for the internal tlsext APITheo Buehler
2020-06-04Improve client certificate selection for TLSv1.3Theo Buehler
2020-05-23Wire up SSL_MODE_AUTO_RETRY mode to retrying after PHH messages.Joel Sing
2020-05-19Replace SSL_PKEY_RSA_ENC/SSL_PKEY_RSA_SIGN with SSL_PKEY_RSA.Joel Sing
2020-05-19Add support for TLS 1.3 server to send certificate statusBob Beck
2020-05-17Send a decode error alert if a server provides an empty certificate list.Joel Sing
2020-05-16Ensure that a TLSv1.3 server has provided a certificate.Joel Sing
2020-05-13Switch the legacy version to TLS1_2_VERSION when processing server hello.Joel Sing
2020-05-10Provide alert defines for TLSv1.3 and use in the TLSv1.3 code.Joel Sing
2020-05-09Send dummy ChangeCipherSpec messages from the TLSv1.3 client.Joel Sing
2020-05-09Add a middlebox_compat flag and condition session ID randomisation on it.Joel Sing
2020-05-09Add support for certificate status requests in TLS 1.3 clientBob Beck
2020-04-28Move legacy stack interfacing functions into tls13_legacy.c.Joel Sing
2020-04-28Rename tls13_client_synthetic_handshake_message() and move to tls13_lib.c.Joel Sing
2020-04-27Shuffle some functions around.Joel Sing
2020-04-22Improve TLSv1.3 state machine for HelloRetryRequest handling.Joel Sing
2020-04-21Consolidate TLSv1.3 constants.Joel Sing
2020-04-17Generate client key share using our preferred group.Joel Sing
2020-04-08Ensure legacy session ID is persistent during client TLS session.Joel Sing
2020-04-06Send a zero-length session identifier if TLSv1.3 is not enabled.Joel Sing
2020-03-10Use ctx->hs->secrets rather than the S3I(s) version.Joel Sing
2020-02-23According to RFC 8446, Section 4.4.4, recipients of incorrect FinishedTheo Buehler
2020-02-18drop unused include <openssl/curve25519.h>Theo Buehler
2020-02-06Add support for handling hello retry requests in the TLSv1.3 client.Joel Sing
2020-02-05Refactor the server hello processing code in the TLSv1.3 client.Joel Sing
2020-02-05Remove the hello retry request processing code that was previously added.Joel Sing
2020-02-04Free the transcript as soon as we initialise the transcript hash.Joel Sing
2020-01-30Provide struct/functions for handling TLSv1.3 key shares.Joel Sing
2020-01-29If the TLSv1.3 code has not recorded an error and something already existsJoel Sing
2020-01-26When switching back to a legacy client or server, ensure we reset theJoel Sing
2020-01-26Add client certificate support for tls 1.3Bob Beck
2020-01-26Move pad and verify context into tls13_lib.cBob Beck
2020-01-25Only perform the downgrade check if our max version is less than TLSv1.3.Joel Sing
2020-01-25It is possible to receive a pre-TLSv1.3 alert in response to a TLSv1.3Joel Sing
2020-01-23When certificate validation fails, we must send a DECRYPT_ERROR alertBob Beck
2020-01-23Add checking int the client to check the magic values which areBob Beck
2020-01-23Save the legacy session id in the client, and enforce that it is returnedBob Beck
2020-01-23Pass a CBB to TLSv1.3 send handlers.Joel Sing
2020-01-22Pass a handshake message content CBS to TLSv1.3 receive handlers.Joel Sing