summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* In ssl.h rev. 1.152 2018/03/17 15:55:52, tb@ providedschwarze2018-03-176-9/+97
| | | | | SSL_SESSION_has_ticket(3) and SSL_SESSION_get_ticket_lifetime_hint(3). Merge the documentation from OpenSSL, tweaked by me.
* crank majorstb2018-03-171-2/+2
| | | | req by deraadt
* Bump minors after symbol additiontb2018-03-171-1/+1
|
* Bring in compatibility for OpenSSL 1.1 style init functions.beck2018-03-176-5/+81
| | | | | | | | | This adds OPENSSL_init_crypto and OPENSSL_init_ssl, as well thread safety modifications for the existing LibreSSL init functions. The initialization routines are called automatically by the normal entry points into the library, as in newer OpenSSL ok jsing@, nits by tb@ and deraadt@
* Provide SSL_SESSION_get_ticket_lifetime_hint() andtb2018-03-173-2/+18
| | | | | | SSL_SESSION_has_ticket() ok jsing
* Provide SSL_CTX_get_default_passwd_cb{,_userdata}()tb2018-03-173-2/+18
| | | | ok jsing
* SSL_SESSION_get_protocol_version() takes a const SSL_SESSION *.tb2018-03-172-4/+4
| | | | | | Noted by schwarze@ ok jsing@
* Provide SSL_CIPHER_get_auth_nid(), SSL_CIPHER_get_cipher_nid(),jsing2018-03-173-2/+110
| | | | | SSL_CIPHER_get_digest_nid(), SSL_CIPHER_get_kx_nid() and SSL_CIPHER_is_aead().
* Provide SSL_SESSION_get0_id_context().jsing2018-03-173-11/+22
|
* Provide SSL_CTX_get_min_proto_version and SSL_CTX_get_max_proto_versionjca2018-03-156-15/+104
| | | | | | | | | We already provided the setters, so also provide the getters like OpenSSL does. Addition prompted by the use of those functions in recent openvpn releases. manpage diff from schwarze@ (thanks!) with input from jsing@, ok tb@ jsing@
* Provide macro versions of SSL_CTX_set_min/max_proto_version and friendsjca2018-03-031-1/+16
| | | | | Needed at least by openvpn-2.4.5, which detects availability of this interface using #ifdefs... Discussed with & ok jsing@
* fix a wrong preposition; from Daniel Bevenius at gmail dot comschwarze2018-02-271-4/+5
| | | | via OpenSSL commit cbade361 Dec 12 13:14:45 2017 +0100
* Add a cross reference to SSL_get_ex_data_X509_STORE_CTX_idx(3);schwarze2018-02-271-3/+9
| | | | | from Rich Salz <rsalz@openssl.org> via OpenSSL commit 9e183d22 Mar 11 08:56:44 2017 -0500.
* Import SSL_CTX_set_tlsext_use_srtp(3) from OpenSSL, slightly tweaked by me.schwarze2018-02-272-1/+190
|
* Add four options that exist in our tree and are documented in OpenSSL.schwarze2018-02-271-1/+9
|
* sort option list alphabetically in preparation for adding missing options;schwarze2018-02-271-28/+28
| | | | no text change
* Mention that SSL_OP_TLSEXT_PADDING no longer has any effect,schwarze2018-02-271-12/+10
| | | | | and correct the description of SSL_OP_ALL. Found by inspecting <openssl/ssl.h>.
* Merge the documentation of SSL_CIPHER_get_id(3) andschwarze2018-02-271-42/+71
| | | | | the new RETURN VALUES section from OpenSSL, tweaked by me. While here, correct the description of SSL_CIPHER_description(3).
* In ssl.h rev. 1.145 2018/02/22 17:30:25, jsing@ provided SSL_is_server(3).schwarze2018-02-271-9/+34
| | | | | Merge the documentation from OpenSSL, slightliy tweaking the wording for precision. The connection is not necessarily "working" yet.
* In ssl.h rev. 1.144 2018/02/22 17:29:24, jsing@ provided SSL_up_ref(3).schwarze2018-02-271-6/+19
| | | | Merge the documentation from OpenSSL.
* In ssl.h rev. 1.143 2018/02/22 17:27:07, jsing@ providedschwarze2018-02-261-6/+24
| | | | SSL_CTX_get_ciphers(3). Merge the documentation from OpenSSL.
* In ssl.h rev. 1.142 2018/02/22 17:25:18, jsing@ providedschwarze2018-02-261-12/+23
| | | | | SSL_SESSION_up_ref(3). Merge the documentation from OpenSSL, tweaked by me.
* In x509_vfy.h rev. 1.22 2018/02/22 17:15:09, jsing@ providedschwarze2018-02-251-3/+4
| | | | | | X509_STORE_up_ref(3). X509_STORE_new(3) and X509_STORE_free(3) have already been available earlier. Import the documentation from OpenSSL, adding some precision.
* In ssl.h rev. 1.141 2018/02/20 18:07:11, tb@ providedschwarze2018-02-247-12/+106
| | | | | SSL_SESSION_get_protocol_version(3). Import the documentation form OpenSSL, tweaked by me, OK tb@.
* Bump lib{crypto,ssl,tls} minors due to symbol additions.jsing2018-02-221-1/+1
|
* Provide SSL_is_server().jsing2018-02-223-2/+10
|
* Provide SSL_up_ref().jsing2018-02-223-3/+12
|
* Provide SSL_CTX_get_ciphers().jsing2018-02-223-2/+10
|
* Provide SSL_SESSION_up_ref().jsing2018-02-223-3/+12
|
* Crank lib{crypto,ssl,tls} minors after symbol addition.tb2018-02-201-1/+1
|
* Provide SSL_SESSION_get_protocol_version()tb2018-02-203-2/+10
| | | | ok jsing
* Merge new RETURN VALUES section; from Paul Yang viaschwarze2018-02-191-6/+35
| | | | OpenSSL commit 1f13ad31 Dec 25 17:50:39 2017 +0800 tweaked by me.
* In ssl.h rev. 1.139 2018/02/17 15:19:43 and rev. 1.140 2018/02/17 15:32:20,schwarze2018-02-182-1/+148
| | | | | | jsing@ provided SSL_get_client_random(3), SSL_get_server_random(3), and SSL_SESSION_get_master_key(3). Import the documentation from OpenSSL, with some tweaks.
* In ssl.h rev. 1.138 2018/02/17 15:13:12, jsing@ providedschwarze2018-02-182-1/+48
| | | | | SSL_CTX_get0_certificate(3). It is public in OpenSSL, too, but OpenSSL has no documentation, so write some from scratch.
* In tls1.h rev. 1.32 2018/02/17 15:08:21, jsing@ providedschwarze2018-02-181-7/+29
| | | | | | | | SSL_CTX_get_tlsext_status_cb(3) and SSL_CTX_get_tlsext_status_arg(3). Merge the documentation, mostly from Remi Gacogne <rgacogne-github at coredump dot fr> via OpenSSL commit fddfc0af Aug 6 12:54:29 2016 +0200 plus the RETURN VALUES part by me.
* Bump minor due to symbol addition.tb2018-02-181-1/+1
|
* Bump libcrypto/libssl/libtls minors due to symbol additions.tb2018-02-181-1/+1
|
* Bump libcrypto/libssl/libtls minors due to symbol additions.jsing2018-02-171-1/+1
|
* Provide SSL_SESSION_get_master_key()jsing2018-02-173-2/+22
|
* Provide SSL_get_client_random() and SSL_get_server_random()jsing2018-02-173-3/+41
|
* Provide SSL_CTX_get0_certificate()jsing2018-02-173-2/+13
|
* Provide SSL_CTX_get_tlsext_status_cb() and SSL_CTX_get_tlsext_status_arg().jsing2018-02-173-4/+24
|
* In ssl.h rev. 1.136 2018/02/14 17:08:44, jsing@ providedschwarze2018-02-141-15/+32
| | | | | | SSL_CTX_up_ref(3). Merge the related documentation from OpenSSL, but tweak the wording to be less confusing and simplify the RETURN VALUES section.
* In ssl.h rev. 1.135 2018/02/14 16:16:10, jsing@ providedschwarze2018-02-141-4/+42
| | | | | SSL_CTX_get0_param(3) and SSL_get0_param(3). Merge the related documentation from OpenSSL, with small tweaks.
* Bump lib{crypto,ssl,tls} minors due to symbol additions.jsing2018-02-141-1/+1
|
* Provide SSL_CTX_up_ref().jsing2018-02-143-2/+11
|
* Provide SSL_CTX_get0_param() and SSL_get0_param().jsing2018-02-143-5/+20
| | | | | Some applications that use X509_VERIFY_PARAM expect these to exist, since they're also part of the OpenSSL 1.0.2 API.
* Bump lib{crypto,ssl,tls} minors due to symbol addition.jsing2018-02-101-1/+1
|
* Complete the TLS extension rewrite on the client-side.jsing2018-02-084-156/+93
| | | | | | | | | | | The RI logic gets pulled up into ssl3_get_server_hello() and ssl_parse_serverhello_tlsext() gets replaced by tlsext_client_parse(), which allows a CBS to be passed all the way down. This also deduplicates the tlsext_client_build() and tlsext_server_build() code. ok beck@
* Initialize variables to avoid compiler warningsinoguchi2018-01-281-2/+2
| | | | ok jsing@