summaryrefslogtreecommitdiffstats
path: root/lib/libssl/ssl_clnt.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Garbage collect s->internal->typetb2021-03-271-3/+1
* Rename new_cipher to cipher.jsing2021-03-241-14/+14
* Add SSL_HANDSHAKE_TLS12 for TLSv1.2 specific handshake data.jsing2021-03-241-7/+7
* Remove ssl_downgrade_max_version().jsing2021-03-111-7/+4
* Improve internal version handling.jsing2021-03-101-3/+17
* Factor out/change some of the legacy client version handling code.jsing2021-02-221-9/+4
* ugly whitespacetb2021-02-201-8/+8
* Rename f_err into fatal_err.tb2021-02-201-60/+60
* Rename the truncated label into decode_err. This describes its purposetb2021-02-201-46/+46
* Revise HelloVerifyRequest handling for DTLSv1.2.jsing2021-02-201-2/+7
* Group HelloVerifyRequest decoding and add missing check for trailing data.jsing2021-02-201-4/+5
* Absorb ssl3_get_algorithm2() into ssl_get_handshake_evp_md().jsing2021-02-071-2/+3
* Factor out the legacy stack version checks.jsing2021-02-071-13/+5
* Replace SSL_IS_DTLS with SSL_is_dtls().jsing2020-10-141-25/+25
* Condense and simplify TLS methods.jsing2020-10-111-2/+2
* Merge d1_{clnt,srvr}.c into ssl_{clnt,srvr}.cjsing2020-10-031-2/+58
* Simplify the cleanup of init_buf via a ssl3_release_init_buffer() function.jsing2020-09-241-5/+3
* Simplify SSL method lookups.jsing2020-09-171-4/+2
* Remove cipher_list_by_id.jsing2020-09-111-6/+3
* Improve argument order for the internal tlsext APItb2020-07-031-3/+3
* Enable GOST_SIG_FORMAT_RS_LE when verifying certificate signatures.jsing2020-06-051-1/+7
* Correct downgrade sentinels when a version pinned method is in use.jsing2020-05-311-2/+2
* Replace SSL_PKEY_RSA_ENC/SSL_PKEY_RSA_SIGN with SSL_PKEY_RSA.jsing2020-05-191-4/+4
* Use size_t for OCSP response length.jsing2020-05-101-5/+2
* Drop a redundant test. It's effectively doing the same test twicetb2020-05-091-3/+2
* RFC 8446, section 4.1.3: If a TLSv1.2 client receives a ServerHello fortb2020-03-061-1/+27
* Factor out/rewrite the ECDHE EC point key exchange code.jsing2020-01-301-94/+15
* Remove the ssl_get_message function pointer from SSL_METHOD_INTERNAL.jsing2020-01-231-13/+11
* Clean up and simplify the client verify code:jsing2019-03-311-50/+49
* Defer sigalgs selection until the certificate is known.jsing2019-03-251-12/+18
* Rework ssl3_output_cert_chain() to take a CERT_PKEY and consider chains.jsing2019-03-251-2/+2
* Revert TLS1_get{,_client}_version simplification because DTLS.jsing2019-03-191-2/+2
* Partially clean up the TLS1_get_{,client}_version macros.jsing2019-03-171-2/+2
* Rename tls1_handshake_hash*() to tls1_transcript_hash*().jsing2019-02-091-4/+4
* Modify sigalgs extension processing to accomodate TLS 1.3.beck2019-01-231-2/+3
* revert previous, accidentally contained another diff in additionbeck2019-01-231-3/+2
* Modify sigalgs extension processing for TLS 1.3.beck2019-01-231-2/+3
* Rename TLS extension handling to use less "hello".jsing2019-01-181-3/+3
* Refactor a tangle in ssl3_send_client_verify() into one function for eachtb2018-11-291-118/+213
* Fix DTLS transcript handling for HelloVerifyRequest.jsing2018-11-211-10/+5
* Revert previous - DTLSv1 uses MD5+SHA1 for RSA signature verification.jsing2018-11-191-5/+2
* Fix DTLS, because DTLS still remains a special flower, allows regress to passbeck2018-11-171-2/+5
* revert previousbeck2018-11-161-5/+3
* Fix DTLS. Because the DTLS code is strange. I am really coming around tobeck2018-11-161-3/+5
* Unbreak legacy ciphers for prior to 1.1 by setting having a legacybeck2018-11-161-2/+2
* Add check function to verify that pkey is usable with a sigalg.beck2018-11-111-2/+2
* Add support for RSA PSS algorithims being used in sigalgs.beck2018-11-111-1/+14
* Convert signatures and verifcation to use the EVP_DigestXXX apibeck2018-11-111-24/+52
* Stop keeping track of sigalgs by guessing it from digest and pkey,beck2018-11-101-12/+12
* Ensure we free the handshake transcript upon session resumption.jsing2018-11-091-1/+4