index
:
src
cvs/HEAD
kms/intel
kms/radeon
master
OpenBSD base system
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
lib
/
libssl
Age
Commit message (
Expand
)
Author
2020-02-21
Remove some commented code, remove some pointless comments and move some
Joel Sing
2020-02-21
Convert dtls1_build_sequence_number() to CBB.
Joel Sing
2020-02-21
Move l2n/l2n8 into s3_cbc.c, since this is the only code that uses it.
Joel Sing
2020-02-21
Remove prefix_len, since it is always zero.
Joel Sing
2020-02-21
Remove now unused variable.
Joel Sing
2020-02-19
Refactor do_ssl3_write().
Joel Sing
2020-02-18
drop unused include <openssl/curve25519.h>
Theo Buehler
2020-02-16
Avoid potential NULL dereference when parsing a server keyshare extension.
Joel Sing
2020-02-16
Avoid leak for tmp.x25519
Kinichiro Inoguchi
2020-02-15
Move the TLSv1.3 code that interfaces with the legacy APIs/stack into a
Joel Sing
2020-02-15
Remove #include that is not needed.
Joel Sing
2020-02-06
Re-enable the TLSv1.3 client since the known issues have been addressed.
Joel Sing
2020-02-06
Add a workaround to make SSL_set_session() work with TLSv1.3.
Joel Sing
2020-02-06
Add support for handling hello retry requests in the TLSv1.3 client.
Joel Sing
2020-02-06
Correctly handle key share extensions in a hello retry request.
Joel Sing
2020-02-05
Refactor the server hello processing code in the TLSv1.3 client.
Joel Sing
2020-02-05
Remove the hello retry request processing code that was previously added.
Joel Sing
2020-02-05
Provide tls1_transcript_unfreeze() to avoid the need for manual flags
Joel Sing
2020-02-05
Pull the handshake message transcript code into its own function.
Joel Sing
2020-02-05
Rework tls13_legacy_handshake_message_{recv,sent}_cb() to use
Theo Buehler
2020-02-04
Add support for TLSv1.3 key shares with secp256r1 and secp384r1 groups.
Joel Sing
2020-02-04
Free the transcript as soon as we initialise the transcript hash.
Joel Sing
2020-02-01
Correctly unpack client key shares.
Joel Sing
2020-02-01
Disable TLSv1.3 client while some known issues are being addressed.
Joel Sing
2020-01-30
Provide struct/functions for handling TLSv1.3 key shares.
Joel Sing
2020-01-30
Factor out/rewrite the ECDHE EC point key exchange code.
Joel Sing
2020-01-29
Remove dead prototypes.
Joel Sing
2020-01-29
If the TLSv1.3 code has not recorded an error and something already exists
Joel Sing
2020-01-29
Remove unused stub implementation of tls13_accept(). The correct
Theo Buehler
2020-01-26
Fix SSL_CIPHER_description
Kinichiro Inoguchi
2020-01-26
When an SSL method is set, bump the max version back to that of the
Joel Sing
2020-01-26
When switching back to a legacy client or server, ensure we reset the
Joel Sing
2020-01-26
Fix basement bug where record layer would not correctly deal with
Bob Beck
2020-01-26
Add server side support for requesting client certificates in tls 1.3
Bob Beck
2020-01-26
Add client certificate support for tls 1.3
Bob Beck
2020-01-26
Add sigalgs for server side to enable client certificate processing
Bob Beck
2020-01-26
Move pad and verify context into tls13_lib.c
Bob Beck
2020-01-25
Add an underbar for consistency.
Theo Buehler
2020-01-25
Revert change to certificate request check from r1.45.
Joel Sing
2020-01-25
Only perform the downgrade check if our max version is less than TLSv1.3.
Joel Sing
2020-01-25
Preserve the transcript hash for the client finished message,
Bob Beck
2020-01-25
Support legacy message callbacks. First step for SSL_set_msg_callback(3)
Theo Buehler
2020-01-25
Correct value for SSL_TLSEXT_MSG_HRR.
Joel Sing
2020-01-25
Only discard the extension block for client hello and server hello
Joel Sing
2020-01-25
Only send an RI extension for pre-TLSv1.3 versions.
Joel Sing
2020-01-25
It is possible to receive a pre-TLSv1.3 alert in response to a TLSv1.3
Joel Sing
2020-01-25
Correct backwards test so that we may accept a certificate requst
Bob Beck
2020-01-24
Complete the initial TLSv1.3 implementation.
Joel Sing
2020-01-24
Preserve the TLS transcript at additional points.
Joel Sing
2020-01-24
Permit 0 length writes, because openssl s_client is special
Bob Beck
[prev]
[next]