summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Check whether the security level allows session tickets.tb2022-06-301-2/+6
* Add checks to ensure we do not initiate or negotiate handshakes withtb2022-06-305-7/+34
* Rename use_* to ssl_use_* for consistency.tb2022-06-301-9/+10
* Remove obj_mac.h include. Requested by jsingtb2022-06-301-2/+1
* Don't check the signature if a cert is self signed.tb2022-06-291-2/+7
* Make ssl_cert_add{0,1}_chain_cert() take ssl/ctxtb2022-06-294-22/+30
* ssl_cert_set{0,1}_chain() take ssl/ctxtb2022-06-294-19/+36
* Add a security check to ssl_set_cert()tb2022-06-291-1/+7
* Make ssl_set_{cert,pkey} take an ssl/ctxtb2022-06-291-12/+20
* Refactor use_certificate_chain_* to take ssl/ctx instead of a certtb2022-06-293-21/+45
* Add functions that check security level in certs and cert chains.tb2022-06-292-2/+147
* Make sure the verifier checks the security level in cert chainstb2022-06-291-2/+9
* Remove a confusing commenttb2022-06-291-7/+2
* Parse the @SECLEVEL=n annotation in cipher stringstb2022-06-293-15/+28
* Add support for sending QUIC transport parametersbeck2022-06-297-7/+209
* whitespace nittb2022-06-291-2/+2
* missing blank linetb2022-06-291-1/+2
* Also check the security level in SSL_get1_supported_cipherstb2022-06-291-2/+5
* Check security level when convertin a cipher list to bytestb2022-06-291-1/+4
* Also check the security level when choosing a shared ciphertb2022-06-291-1/+5
* There's tentacles, tentacles everywheretb2022-06-291-1/+7
* Also check the security level of the 'tmp dh'tb2022-06-293-3/+24
* Check the security of DH key sharestb2022-06-296-6/+42
* Rename one s to ssl for consistencytb2022-06-291-2/+2
* Check sigalg security level when selecting them.tb2022-06-291-1/+4
* Check the security bits of the sigalgs' pkeytb2022-06-291-1/+7
* Check the security level when building sigalgstb2022-06-294-12/+20
* Annotate sigalgs with their security level.tb2022-06-292-2/+23
* Add prototypes for ssl{_ctx,}_security()tb2022-06-281-1/+5
* Add error code definstb2022-06-281-1/+6
* Add a period to a commenttb2022-06-281-2/+2
* Security level >= 3 requires a ciphersuite with PFStb2022-06-281-3/+4
* Add a secop handler for tmp_dhtb2022-06-281-1/+19
* Add security level related error codes.tb2022-06-281-1/+6
* Sort error stringstb2022-06-281-3/+3
* Implement ssl{,_ctx}_security()tb2022-06-281-1/+15
* Copy the security level stuff in ssl_cert_dup()tb2022-06-281-1/+5
* Set up the default callback in SSL_CERTtb2022-06-281-1/+8
* Implement the default security level callbacktb2022-06-283-2/+202
* Provide OPENSSL_TLS_SECURITY_LEVEL definetb2022-06-281-1/+7
* Implement SSL_{CTX_}_{g,s}et_security_level(3)tb2022-06-281-1/+25
* Add security callback, level and ex_data fields to SSL_CERTtb2022-06-281-1/+6
* Add #defines and prototypes for security level APItb2022-06-281-1/+72
* Free ciphers before assigning to themtb2022-06-281-6/+6
* Change the loop index from an unsigned int to size_t now that alltb2022-06-071-2/+2
* Simplify another CBS_write_bytes() call in d2i_SSL_SESSION()tb2022-06-071-5/+2
* Switch sid_ctx_length in SSL, SSL_CTX and SSL_SESSION to a size_ttb2022-06-071-4/+4
* Use CBS_write_bytes() instead of manual unpacking of a CBS and assigningtb2022-06-071-3/+5
* Simplify various CBS_write_bytes() callstb2022-06-073-13/+7
* Switch SSL_SESSION's session_id_length to a size_ttb2022-06-071-2/+2