summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_asn1.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Use cipher suite values instead of IDs.jsing2024-07-221-11/+7
* Remove cipher from SSL_SESSION.jsing2024-07-201-9/+3
* Hide all public symbols in libsslbeck2023-07-081-1/+3
* Make internal header file names consistenttb2022-11-261-2/+2
* Simplify another CBS_write_bytes() call in d2i_SSL_SESSION()tb2022-06-071-5/+2
* Simplify various CBS_write_bytes() callstb2022-06-071-5/+2
* Simplify CBS_write_bytes() invocationtb2022-06-071-5/+2
* Use SSL3_CK_VALUE_MASK instead of hardcoded 0xffff and remove sometb2022-06-061-2/+2
* Rename 'peer' to 'peer_cert' in SSL_SESSION.jsing2022-01-111-6/+6
* Change tlsext_tick_lifetime_hint to uint32_t.jsing2021-10-231-6/+3
* Make local header inclusion consistent.jsing2021-05-161-3/+2
* whitespace nitstb2021-03-291-4/+4
* Simplify new session ticket encoding/generation.jsing2018-08-271-20/+49
* In i2d_SSL_SESSION(), on error call CBB_cleanup() with the correct CBB.jsing2018-03-201-2/+2
* Add missing $OpenBSD$ tags.jsing2017-05-061-2/+1
* Switch back to freezero() and explicitly initialise data_len to zero. Thejsing2017-04-301-6/+3
* backout previous, data_len is not always initializedotto2017-04-161-2/+5
* Switch i2d_SSL_SESSION() back to freezero(3) now that the size constraintsjsing2017-04-141-5/+2
* Revert ssl_asn1.c r1.50 - CBB and freezero(3) do not play nicely together.jsing2017-04-111-2/+5
* Use freezero() for i2d_SSL_SESSION() - one line of code instead of three.jsing2017-04-101-5/+2
* Change SSLerror() back to taking two args, with the first one being an SSL *.beck2017-02-071-2/+2
* Send the error function codes to rot in the depths of hell where they belongbeck2017-01-261-2/+2
* Restore previous ASN.1 encoding for the peer certificate - this wasjsing2016-12-261-7/+5
* Restore previous behaviour of incrementing the pointer so that it pointsjsing2016-12-261-1/+2
* Ensure that we zero memory used to hold the ASN.1 encoded session, sincejsing2016-12-071-1/+4
* Avoid signed vs unsigned warnings from clang by adding two casts,jsing2016-12-031-2/+2
* One of the error paths would attempt to access not-yet-initialized locals.miod2016-11-051-2/+2
* Completely rewrite the session handling ASN.1 code using CBB and CBS. Thisjsing2016-11-041-616/+329
* X509_free(3) is NULL-safe, so remove NULL checks before its calls.mmcc2016-03-111-5/+4
* Remove trailing whitespace.jsing2014-12-141-15/+15
* SSL: Fix memory leak in d2i_SSL_SESSION.bcook2014-10-201-1/+2
* Get rid of the last remaining BUF_strdup and BUF_strlcpy and friends, usebeck2014-10-161-2/+2
* Stop leaking internal library pointers in error messages.jsing2014-07-131-2/+2
* Explicitly initialise slen - this was not previously done due to a missingjsing2014-07-131-1/+2
* Convert error handling to SSLerr and ERR_asprintf_error_data.jsing2014-07-131-59/+54
* Convert d2i_SSL_SESSION to ASN1 primitives, instead of the horrificjsing2014-07-131-26/+297
* Remove license introduced with the PSK code, which has since been removed.jsing2014-07-131-27/+1
* Another compression remnant.jsing2014-07-131-2/+1
* Rewrite i2d_SSL_SESSION to use the ASN1 primitives, rather than using thejsing2014-07-131-75/+98
* KNF and some code cleaning.jsing2014-07-131-36/+46
* Missing initialization for error line in error paths; from Coverity viamiod2014-07-111-1/+4
* Remove the PSK code. We don't need to drag around thisbeck2014-07-111-53/+2
* decompress libssl. ok beck jsingtedu2014-07-101-31/+1
* tags as requested by miod and teduderaadt2014-06-121-1/+1
* TLS would not be entirely functional without extensions, so unifdefjsing2014-05-311-16/+0
* Remove SRP and Kerberos support from libssl. These are complex protocolstedu2014-05-051-66/+0
* Chop off more SSLv2 tentacles and start fixing and noting y2038 issues.guenther2014-04-201-21/+3
* More KNF and style consistency tweaksguenther2014-04-191-3/+2
* Change library to use intrinsic memory allocation functions instead ofbeck2014-04-171-15/+15
* add back SRP. i was being too greedy.tedu2014-04-161-0/+33