summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
...
* If ssl_cert_dup() fails in SSL_set_SSL_CTX(3), return failureschwarze2020-09-181-5/+10
* add forgotten link to newish page SSL_set1_host(3)schwarze2020-09-181-3/+4
* Move variable declaration to beginning of scope in order to make thistb2020-09-181-3/+4
* make this test compile and pass on sparc64 by moving variable declarationstb2020-09-181-4/+9
* move variable declaration up to top to make this compile and passtb2020-09-181-1/+1
* Use void function argument to appease gcc 4.2.1tb2020-09-181-1/+1
* fix "warning: value computed is not used"tb2020-09-181-2/+2
* fix "warning: function declaration isn't a prototype"tb2020-09-181-3/+3
* zap redundant linetb2020-09-181-2/+1
* hook symbols test to regresstb2020-09-181-1/+2
* Check availability of the symbols in Symbols.listtb2020-09-182-0/+182
* Fix potential overflow in CN subject line parsing, thanks tobeck2020-09-181-4/+5
* Prepare to provide SSL_get_peer_tmp_key().jsing2020-09-172-9/+20
* Simplify SSL method lookups.jsing2020-09-175-66/+44
* Add a comment saying that the public function NAME_CONSTRAINTS_check(3)schwarze2020-09-171-2/+5
* Install the new page SSL_set1_host(3), link to it from relevant places,schwarze2020-09-176-22/+31
* Import a manual page for SSL_set1_host(3), which we already have since 6.5,schwarze2020-09-171-0/+155
* revert my putting this on a diet. sadly the NAME_CONSTRAINTS_checkbeck2020-09-161-7/+1
* Group seal record functions together.jsing2020-09-161-11/+11
* Add cipher set tests with empty SSL_set_ciphersuites().jsing2020-09-161-0/+22
* Correct cipher_set_test() when run on a machine without AES acceleration.jsing2020-09-161-1/+19
* Make cipher_set_test() log failures and continue, rather than aborting.jsing2020-09-161-11/+3
* noop NAME_CONSTRAINTS_check stubinoguchi2020-09-161-4/+5
* Let SSL_CTX_get_ciphers(NULL) return NULL rather than crashschwarze2020-09-162-6/+7
* Mark SSL_get_cipher_list(3) as deprecated; it is badly misnamed, and thereschwarze2020-09-161-4/+6
* Avoid memset() before memcpy() for CBB_add_bytes().jsing2020-09-161-2/+2
* Make check in x509_verify_ctx_set_max_signatures() consistent with others.jsing2020-09-161-4/+2
* Dedup code in x509_verify_ctx_new_from_xsc().jsing2020-09-161-14/+7
* The undocumented public function SSL_set_SSL_CTX(3) changes theschwarze2020-09-151-4/+4
* Split the tls12_record_layer_write_mac() function.jsing2020-09-151-10/+19
* Do not destroy an existing cipher list when ssl_parse_ciphersuites()schwarze2020-09-151-4/+2
* Correct a failure case in tls12_record_layer_seal_record_protected()jsing2020-09-151-2/+2
* Create the missing RETURN VALUES section and move the appropriateschwarze2020-09-151-57/+103
* set error_depth and current_cert to make more legacy callbacks that don't checkbeck2020-09-151-1/+3
* Deduplicate the time validation code between the legacy and newbeck2020-09-153-27/+8
* ifdef out code that is no longer used in here. once we are certainbeck2020-09-151-2/+5
* Cleanup/simplify SSL_set_ssl_method().jsing2020-09-151-18/+18
* Mop up the get_ssl_method function pointer.jsing2020-09-152-50/+2
* Test botan TLS client with libressl, openssl, openssl11 server.bluhm2020-09-154-6/+305
* Move state initialisation from SSL_clear() to ssl3_clear().jsing2020-09-142-4/+4
* Cleanup and simplify SSL_set_session().jsing2020-09-141-36/+22
* Avoid NULL deref SSL_{,CTX_}set_ciphersuitestb2020-09-141-2/+2
* simplify RETURN VALUES for x509_verify(3) after beck@ made the rulesschwarze2020-09-141-7/+3
* Add initial man page for new x509_verify chain validatorbeck2020-09-141-0/+225
* Set error if we are given an NULL ctx in x509_verify, and set errorbeck2020-09-141-5/+3
* nuke a stray spacetb2020-09-141-2/+2
* Fix potential leak when tmpext fails to be added tobeck2020-09-141-2/+6
* Change the known output to be the expected output, so that webeck2020-09-141-1421/+1421
* Use a fixed validation time in these tests so we neverbeck2020-09-141-2/+4
* remove unneeded variable "type".beck2020-09-141-6/+5