summaryrefslogtreecommitdiff
path: root/lib/libssl/tls13_client.c
AgeCommit message (Expand)Author
2020-04-22Improve TLSv1.3 state machine for HelloRetryRequest handling.Joel Sing
2020-04-21Consolidate TLSv1.3 constants.Joel Sing
2020-04-17Generate client key share using our preferred group.Joel Sing
2020-04-08Ensure legacy session ID is persistent during client TLS session.Joel Sing
2020-04-06Send a zero-length session identifier if TLSv1.3 is not enabled.Joel Sing
2020-03-10Use ctx->hs->secrets rather than the S3I(s) version.Joel Sing
2020-02-23According to RFC 8446, Section 4.4.4, recipients of incorrect FinishedTheo Buehler
2020-02-18drop unused include <openssl/curve25519.h>Theo Buehler
2020-02-06Add support for handling hello retry requests in the TLSv1.3 client.Joel Sing
2020-02-05Refactor the server hello processing code in the TLSv1.3 client.Joel Sing
2020-02-05Remove the hello retry request processing code that was previously added.Joel Sing
2020-02-04Free the transcript as soon as we initialise the transcript hash.Joel Sing
2020-01-30Provide struct/functions for handling TLSv1.3 key shares.Joel Sing
2020-01-29If the TLSv1.3 code has not recorded an error and something already existsJoel Sing
2020-01-26When switching back to a legacy client or server, ensure we reset theJoel Sing
2020-01-26Add client certificate support for tls 1.3Bob Beck
2020-01-26Move pad and verify context into tls13_lib.cBob Beck
2020-01-25Only perform the downgrade check if our max version is less than TLSv1.3.Joel Sing
2020-01-25It is possible to receive a pre-TLSv1.3 alert in response to a TLSv1.3Joel Sing
2020-01-23When certificate validation fails, we must send a DECRYPT_ERROR alertBob Beck
2020-01-23Add checking int the client to check the magic values which areBob Beck
2020-01-23Save the legacy session id in the client, and enforce that it is returnedBob Beck
2020-01-23Pass a CBB to TLSv1.3 send handlers.Joel Sing
2020-01-22Pass a handshake message content CBS to TLSv1.3 receive handlers.Joel Sing
2020-01-22Send alerts on certificate verification failures of server certsBob Beck
2020-01-22After the ClientHello has been sent or received and before the peer'sTheo Buehler
2020-01-22Correctly set the legacy version when TLSv1.3 is building a client hello.Joel Sing
2020-01-22The legacy_record_version must be set to TLS1_2_VERSION exceptTheo Buehler
2020-01-22Add minimal support for hello retry request for RFC conformance.Bob Beck
2020-01-21Correct legacy fallback for TLSv1.3 client.Joel Sing
2020-01-21Add alert processing in tls client code, by adding alert to theBob Beck
2020-01-20Provide an error framework for use with the TLSv1.3 code.Joel Sing
2019-11-17tls13_connect() should be static.Joel Sing
2019-11-17Fix backoff to legacy when in client auth mode.Bob Beck
2019-11-17Drop back to the legacy tls method if we are doing client authenticaitonBob Beck
2019-04-05By design, our state machine is a DAG contrary to the state machine inTheo Buehler
2019-04-04Implement legacy fallback for the TLS 1.3 client.Joel Sing
2019-03-25Defer sigalgs selection until the certificate is known.Joel Sing
2019-02-28Set the SSL state as part of tls13_legacy_connect().Joel Sing
2019-02-25Add a handshake action sent handler and use it for client finished.Joel Sing
2019-02-25Correct a few error returns.Joel Sing
2019-02-14Switch to application traffic keys as appropriate.Joel Sing
2019-02-14Split tls13_record_layer_set_traffic_keys() into two separate functions.Joel Sing
2019-02-13Clean up some pesky trailing whitespace.Joel Sing
2019-02-13Handle finished messages in TLSv1.3 client.Joel Sing
2019-02-11Implement handling of Certificate and CertificateVerify messages.Joel Sing
2019-02-09Rename tls1_handshake_hash*() to tls1_transcript_hash*().Joel Sing
2019-02-09Provide a reference from the TLSv1.3 context to the handshake state.Joel Sing
2019-02-07Implement processing of EncryptedExtensions in the TLS 1.3 client.Joel Sing
2019-02-04Implement parsing and processing of TLSv1.3 ServerHello messages.Joel Sing