summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_lib.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Don't leave stale sequence numbers behind in ssl3_clear()libressl-v3.2.5tb2021-03-151-4/+3
* This is errata/6.8/013_libressl.patch.siglibressl-v3.2.4tb2021-02-031-3/+12
* Simplify the cleanup of init_buf via a ssl3_release_init_buffer() function.jsing2020-09-241-4/+3
* Prepare to provide SSL_get0_peernametb2020-09-191-1/+7
* Prepare to provide stubbed out versions for reading/writing 0-RTT datatb2020-09-191-1/+29
* Prepare to provide SSL{,_CTX}_{get,set}_max_early_datatb2020-09-191-1/+24
* If ssl_cert_dup() fails in SSL_set_SSL_CTX(3), return failureschwarze2020-09-181-5/+10
* Let SSL_CTX_get_ciphers(NULL) return NULL rather than crashschwarze2020-09-161-1/+3
* Cleanup/simplify SSL_set_ssl_method().jsing2020-09-151-18/+18
* Move state initialisation from SSL_clear() to ssl3_clear().jsing2020-09-141-3/+1
* Implement SSL_{CTX_,}set_ciphersuites().jsing2020-09-131-6/+51
* Remove cipher_list_by_id.jsing2020-09-111-49/+6
* Simplify SSL_get_ciphers().jsing2020-09-111-13/+7
* Rename ssl_cipher_is_permitted()jsing2020-09-111-2/+3
* Various ciphers related clean up.jsing2020-09-111-41/+36
* Start replacing the existing TLSv1.2 record layer.jsing2020-08-301-1/+14
* In SSL_new() just 'goto err' on allocation failure.jsing2020-08-111-11/+6
* Revert the TLSv1.3 version switching fix/hack.jsing2020-07-141-10/+1
* Remove some unnecessary function pointers from SSL_METHOD_INTERNAL.jsing2020-07-071-3/+13
* Enable SSL_MODE_AUTO_RETRY by default.jsing2020-05-231-1/+2
* fix a confusingly wrapped linetb2020-05-231-3/+3
* Make ssl_set_cert_masks() more consistent and closer to readable.jsing2020-05-211-44/+27
* Replace SSL_PKEY_RSA_ENC/SSL_PKEY_RSA_SIGN with SSL_PKEY_RSA.jsing2020-05-191-16/+8
* Use size_t for OCSP response length.jsing2020-05-101-2/+2
* Consistently spell 'unsigned' as 'unsigned int', as style(9) seemstb2020-03-161-3/+3
* When an SSL method is set, bump the max version back to that of thejsing2020-01-261-1/+10
* Correctly handle TLSv1.3 ciphers suites in ssl3_choose_cipher().jsing2020-01-231-1/+4
* Switch back to a function pointer for ssl_pending.jsing2020-01-231-10/+2
* Clear and free the tls13_ctx that hangs off an SSL *s fromtb2020-01-211-1/+6
* Bring back the ssl_shutdown internal method pointer.jsing2019-11-171-2/+2
* Allow ip addresses as argument to SSL_set1_host() but be careful to nototto2019-11-041-2/+14
* s3 is never NULL since s2 (formerly used for SSLv2) does not exist, so there isbcook2019-05-151-19/+13
* Strip out all of the pkey to sigalg and sigalg to pkey linkages.jsing2019-03-251-10/+4
* Defer sigalgs selection until the certificate is known.jsing2019-03-251-13/+2
* Remove ssl_get_server_send_cert() which is now unused.jsing2019-03-251-12/+1
* Add a re-implementation of SSL_get1_supported_ciphers().tb2019-01-221-1/+35
* Provide SSL_get_client_ciphers().tb2019-01-221-1/+9
* Move ssl_cipher_list_to_bytes() and ssl_bytes_to_cipher_list() totb2019-01-211-115/+1
* Use ssl_cipher_is_permitted() in ssl_cipher_list_to_bytes().tb2019-01-211-9/+6
* Teach ssl_version_string() about TLS1_3_VERSION.jsing2019-01-211-1/+3
* Revert previous - DTLSv1 uses MD5+SHA1 for RSA signature verification.jsing2018-11-191-5/+2
* Fix DTLS, because DTLS still remains a special flower, allows regress to passbeck2018-11-171-2/+5
* Fix wrong sizeof argument by using 'uint16_t *', with minor nit from tb@,mestre2018-11-141-2/+2
* Add SSL_set1_host(), a thin wrapper around X509_VERIFY_PARAM_set1_host().tb2018-11-111-1/+7
* Stop keeping track of sigalgs by guessing it from digest and pkey,beck2018-11-101-7/+29
* Stop pretending that a cert member in a SSL and SSL_CTX can be NULL.jsing2018-11-081-32/+9
* Add TLSv1.3 cipher suites (with appropriate guards).jsing2018-11-071-1/+6
* Use the newer/more sensible names for EVP_MD_CTX_* functions.jsing2018-09-051-3/+3
* Correctly clear the current cipher state, when changing cipher state.jsing2018-09-051-27/+25
* Nuke ssl_pending/ssl_shutdown function pointers.jsing2018-08-301-6/+6