index
:
src
cvs/HEAD
kms/intel
kms/radeon
master
OpenBSD base system
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
lib
/
libssl
/
tls13_client.c
Age
Commit message (
Expand
)
Author
2020-06-04
Improve client certificate selection for TLSv1.3
Theo Buehler
2020-05-23
Wire up SSL_MODE_AUTO_RETRY mode to retrying after PHH messages.
Joel Sing
2020-05-19
Replace SSL_PKEY_RSA_ENC/SSL_PKEY_RSA_SIGN with SSL_PKEY_RSA.
Joel Sing
2020-05-19
Add support for TLS 1.3 server to send certificate status
Bob Beck
2020-05-17
Send a decode error alert if a server provides an empty certificate list.
Joel Sing
2020-05-16
Ensure that a TLSv1.3 server has provided a certificate.
Joel Sing
2020-05-13
Switch the legacy version to TLS1_2_VERSION when processing server hello.
Joel Sing
2020-05-10
Provide alert defines for TLSv1.3 and use in the TLSv1.3 code.
Joel Sing
2020-05-09
Send dummy ChangeCipherSpec messages from the TLSv1.3 client.
Joel Sing
2020-05-09
Add a middlebox_compat flag and condition session ID randomisation on it.
Joel Sing
2020-05-09
Add support for certificate status requests in TLS 1.3 client
Bob Beck
2020-04-28
Move legacy stack interfacing functions into tls13_legacy.c.
Joel Sing
2020-04-28
Rename tls13_client_synthetic_handshake_message() and move to tls13_lib.c.
Joel Sing
2020-04-27
Shuffle some functions around.
Joel Sing
2020-04-22
Improve TLSv1.3 state machine for HelloRetryRequest handling.
Joel Sing
2020-04-21
Consolidate TLSv1.3 constants.
Joel Sing
2020-04-17
Generate client key share using our preferred group.
Joel Sing
2020-04-08
Ensure legacy session ID is persistent during client TLS session.
Joel Sing
2020-04-06
Send a zero-length session identifier if TLSv1.3 is not enabled.
Joel Sing
2020-03-10
Use ctx->hs->secrets rather than the S3I(s) version.
Joel Sing
2020-02-23
According to RFC 8446, Section 4.4.4, recipients of incorrect Finished
Theo Buehler
2020-02-18
drop unused include <openssl/curve25519.h>
Theo Buehler
2020-02-06
Add support for handling hello retry requests in the TLSv1.3 client.
Joel Sing
2020-02-05
Refactor the server hello processing code in the TLSv1.3 client.
Joel Sing
2020-02-05
Remove the hello retry request processing code that was previously added.
Joel Sing
2020-02-04
Free the transcript as soon as we initialise the transcript hash.
Joel Sing
2020-01-30
Provide struct/functions for handling TLSv1.3 key shares.
Joel Sing
2020-01-29
If the TLSv1.3 code has not recorded an error and something already exists
Joel Sing
2020-01-26
When switching back to a legacy client or server, ensure we reset the
Joel Sing
2020-01-26
Add client certificate support for tls 1.3
Bob Beck
2020-01-26
Move pad and verify context into tls13_lib.c
Bob Beck
2020-01-25
Only perform the downgrade check if our max version is less than TLSv1.3.
Joel Sing
2020-01-25
It is possible to receive a pre-TLSv1.3 alert in response to a TLSv1.3
Joel Sing
2020-01-23
When certificate validation fails, we must send a DECRYPT_ERROR alert
Bob Beck
2020-01-23
Add checking int the client to check the magic values which are
Bob Beck
2020-01-23
Save the legacy session id in the client, and enforce that it is returned
Bob Beck
2020-01-23
Pass a CBB to TLSv1.3 send handlers.
Joel Sing
2020-01-22
Pass a handshake message content CBS to TLSv1.3 receive handlers.
Joel Sing
2020-01-22
Send alerts on certificate verification failures of server certs
Bob Beck
2020-01-22
After the ClientHello has been sent or received and before the peer's
Theo Buehler
2020-01-22
Correctly set the legacy version when TLSv1.3 is building a client hello.
Joel Sing
2020-01-22
The legacy_record_version must be set to TLS1_2_VERSION except
Theo Buehler
2020-01-22
Add minimal support for hello retry request for RFC conformance.
Bob Beck
2020-01-21
Correct legacy fallback for TLSv1.3 client.
Joel Sing
2020-01-21
Add alert processing in tls client code, by adding alert to the
Bob Beck
2020-01-20
Provide an error framework for use with the TLSv1.3 code.
Joel Sing
2019-11-17
tls13_connect() should be static.
Joel Sing
2019-11-17
Fix backoff to legacy when in client auth mode.
Bob Beck
2019-11-17
Drop back to the legacy tls method if we are doing client authenticaiton
Bob Beck
2019-04-05
By design, our state machine is a DAG contrary to the state machine in
Theo Buehler
[next]