summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
* Recommend SSL_CTX_add1_chain_cert(3) rather thanschwarze2019-04-091-12/+11
* Document SSL_CTX_clear_mode(3) and SSL_clear_mode(3).schwarze2019-04-091-22/+48
* By design, our state machine is a DAG contrary to the state machine intb2019-04-054-7/+29
* Import SSL_CTX_add1_chain_cert(3) from OpenSSL branch 1.1.1, which is stillschwarze2019-04-055-17/+264
* Zap two dead #defines that were unused since jsing deleted thetb2019-04-051-5/+1
* Implement legacy fallback for the TLS 1.3 client.jsing2019-04-043-8/+87
* Clean up the cipher/digest table mess.jsing2019-04-043-179/+45
* Bump libssl/libtls minors due to symbol addition.jsing2019-04-041-1/+1
* Provide SSL chain/cert chain APIs.jsing2019-04-043-2/+161
* This case also needs to be fatal.jsing2019-04-041-1/+2
* mark ERR_R_INTERNAL_ERROR instead of assert or _exit, sighderaadt2019-04-011-3/+3
* Correct subtle bug in sigalgs, only care about curve_nid if we arebeck2019-04-011-4/+4
* Clean up and simplify the client verify code:jsing2019-03-311-50/+49
* Strip out all of the pkey to sigalg and sigalg to pkey linkages.jsing2019-03-255-59/+8
* tls1_process_sigalgs() is no longer needed.jsing2019-03-252-57/+2
* Defer sigalgs selection until the certificate is known.jsing2019-03-259-48/+124
* Rework ssl_ctx_use_certificate_chain_bio() to use the CERT_PKEY chain.jsing2019-03-251-46/+26
* Remove ssl_get_server_send_cert() which is now unused.jsing2019-03-252-14/+2
* Rework ssl3_output_cert_chain() to take a CERT_PKEY and consider chains.jsing2019-03-254-40/+36
* Add a chain member to CERT_PKEY and provide functions for manipulating it.jsing2019-03-252-3/+74
* If ssl_cipher_apply_rule() is given a specific cipher suite, match on it.jsing2019-03-241-3/+4
* do not call assert(), which has a tendency to leave traces of stuff inderaadt2019-03-241-2/+3
* Avoid an internal 2 byte overread in ssl_sigalgs().jsing2019-03-191-7/+2
* Revert TLS1_get{,_client}_version simplification because DTLS.jsing2019-03-194-14/+15
* * note that the handshake must be completed firstschwarze2019-03-181-4/+15
* In ssl.h rev. 1.165, tb@ provided version agnostic DTLS methods.schwarze2019-03-181-3/+26
* bump minors after symbol additiontb2019-03-171-1/+1
* Provide version agnostic DTLS methods.jsing2019-03-173-2/+27
* Correct return value handling in tls13_handshake_recv_action().jsing2019-03-171-2/+4
* Partially clean up the TLS1_get_{,client}_version macros.jsing2019-03-174-15/+14
* Remove the alert level from the TLSv1.3 alert callback.jsing2019-03-173-7/+6
* Don't index a void pointer, fixes compilation with visual studio.millert2019-03-041-2/+3
* Implement non-SSL_MODE_ENABLE_PARTIAL_WRITE in tls13_legacy_write_bytes().jsing2019-02-281-3/+34
* Automatically complete the handshake from tls13_legacy_{read,write}_bytes()jsing2019-02-283-3/+17
* Set the SSL state as part of tls13_legacy_connect().jsing2019-02-281-2/+5
* Add appropriate length checks to tls13_legacy_{read,write}_bytes()jsing2019-02-281-3/+9
* Remove unused record_type from TLSv1.3 handshake actions.jsing2019-02-281-16/+1
* Correct return values for non-fatal alerts.jsing2019-02-261-3/+3
* Correctly propagate EOF from BIO in tls13_legacy_wire_read().jsing2019-02-261-1/+3
* Fix gcc3 compilation error by using a forward declaration instead of atb2019-02-251-3/+3
* revert "Move struct ssl_handshake_tls13_st definition", i.e., movetb2019-02-252-24/+26
* Correctly handle oversize writes.jsing2019-02-251-2/+4
* Add a handshake action sent handler and use it for client finished.jsing2019-02-253-11/+22
* Correct a few error returns.jsing2019-02-251-4/+4
* Move struct ssl_handshake_tls13_st definitioninoguchi2019-02-252-26/+24
* Remove temporary gotos.jsing2019-02-231-7/+3
* Set BIO retry on TLS13_IO_WANT_POLLIN/TLS13_IO_WANT_POLLOUT.jsing2019-02-231-1/+3
* Wire up alert handling for TLSv1.3.jsing2019-02-212-9/+78
* Change the alert callback return type from int to void.jsing2019-02-212-9/+11
* Fix a few cases where int was used instead of ssize_t.jsing2019-02-211-3/+3