summaryrefslogtreecommitdiffstats
path: root/lib/libssl/ssl_srvr.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Avoid transcript initialisation when sending a TLS HelloRequest.jsing2021-03-291-4/+6
* Garbage collect s->internal->typetb2021-03-271-3/+1
* Rename new_cipher to cipher.jsing2021-03-241-17/+17
* Add SSL_HANDSHAKE_TLS12 for TLSv1.2 specific handshake data.jsing2021-03-241-9/+9
* Remove ssl_downgrade_max_version().jsing2021-03-111-7/+5
* Improve internal version handling.jsing2021-03-101-2/+19
* ugly whitespacetb2021-02-201-6/+6
* Rename f_err into fatal_err.tb2021-02-201-69/+69
* Rename the truncated label into decode_err. This describes its purposetb2021-02-201-27/+27
* Revise HelloVerifyRequest handling for DTLSv1.2.jsing2021-02-201-2/+7
* Factor out the legacy stack version checks.jsing2021-02-071-13/+6
* Move sequence numbers into the new TLSv1.2 record layer.jsing2021-01-261-4/+3
* Provide functions to determine if TLSv1.2 record protection is engaged.jsing2021-01-191-3/+3
* Replace SSL_IS_DTLS with SSL_is_dtls().jsing2020-10-141-26/+26
* Condense and simplify TLS methods.jsing2020-10-111-2/+2
* Merge d1_{clnt,srvr}.c into ssl_{clnt,srvr}.cjsing2020-10-031-2/+41
* Simplify the cleanup of init_buf via a ssl3_release_init_buffer() function.jsing2020-09-241-5/+3
* Simplify SSL method lookups.jsing2020-09-171-4/+2
* Use the correct type for tls1_set_ec_id()tb2020-09-121-3/+3
* Remove cipher_list_by_id.jsing2020-09-111-5/+1
* Send alert on ssl_get_prev_session failuretb2020-08-311-3/+3
* Improve argument order for the internal tlsext APItb2020-07-031-3/+3
* Enable GOST_SIG_FORMAT_RS_LE when verifying certificate signatures.jsing2020-06-051-1/+8
* Send an illegal_parameter alert if a client sends us invalid DH keytb2020-06-011-3/+15
* Correct downgrade sentinels when a version pinned method is in use.jsing2020-05-311-3/+3
* Replace SSL_PKEY_RSA_ENC/SSL_PKEY_RSA_SIGN with SSL_PKEY_RSA.jsing2020-05-191-2/+2
* Use size_t for OCSP response length.jsing2020-05-101-2/+2
* On receiving an overlong session ID terminate with an illegal_parametertb2020-05-091-1/+6
* TLSv1.3 servers that intend to downgrade are required to set the lasttb2020-03-061-4/+8
* Avoid leak for tmp.x25519inoguchi2020-02-161-4/+7
* Factor out/rewrite the ECDHE EC point key exchange code.jsing2020-01-301-77/+21
* Remove the ssl_get_message function pointer from SSL_METHOD_INTERNAL.jsing2020-01-231-6/+5
* If we are building a legacy server hello, check to see if we arebeck2020-01-231-1/+20
* Pass the session ID down to the session/ticket handling code as a CBS.jsing2019-04-221-3/+2
* Inline and remove the tlsext_tick_md macro.jsing2019-04-221-2/+2
* Defer sigalgs selection until the certificate is known.jsing2019-03-251-2/+2
* Rework ssl3_output_cert_chain() to take a CERT_PKEY and consider chains.jsing2019-03-251-4/+4
* Rename tls1_handshake_hash*() to tls1_transcript_hash*().jsing2019-02-091-3/+3
* Rename TLS extension handling to use less "hello".jsing2019-01-181-3/+3
* Remove an ugly hack in the client certificate verification code that workstb2018-12-071-48/+44
* Fix DTLS transcript handling for HelloVerifyRequest.jsing2018-11-211-5/+2
* Add check function to verify that pkey is usable with a sigalg.beck2018-11-111-3/+3
* quiet warning on other compilersbcook2018-11-111-3/+3
* Free the server tls transcript in case session reuse did not work.bluhm2018-11-111-3/+4
* Add support for RSA PSS algorithims being used in sigalgs.beck2018-11-111-1/+15
* Convert signatures and verifcation to use the EVP_DigestXXX apibeck2018-11-111-18/+40
* Stop keeping track of sigalgs by guessing it from digest and pkey,beck2018-11-101-23/+12
* Ensure we only choose sigalgs from our prefernce list, not the whole listbeck2018-11-091-2/+3
* Add the ability to have a separate priority list for sigalgs.beck2018-11-091-2/+2
* Reimplement the sigalgs processing code into a new implementationbeck2018-11-091-23/+13