summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Bump libcrypto, libssl and libtls minors due to symbol additions.jsing2019-11-021-1/+1
* Bump libcrypto, libssl and libtls majors due to changes in struct sizesjsing2019-10-241-2/+2
* Use a valid curve when constructing an EC_KEY that looks like X25519.jsing2019-10-041-2/+3
* Further improve the documentation of library initialization and configuration.schwarze2019-06-143-37/+37
* add missing backlinks to ssl(3)schwarze2019-06-1231-64/+100
* List all 17 SSL pages that were missing.schwarze2019-06-121-51/+89
* remove pointless NOTES section header linesschwarze2019-06-089-27/+27
* provide getters and setters for the RSA_METHOD interfacegilles2019-06-051-1/+1
* Relax parsing of TLS key share extensions on the server.jsing2019-05-291-5/+2
* Do not send an SNI extension when resuming a session that contains a serverjsing2019-05-291-1/+4
* Fix typo and label indent.jsing2019-05-281-3/+3
* Tidy up some names/structures following the renaming of TLS extensionjsing2019-05-281-35/+35
* *an* RSA;jmc2019-05-202-6/+6
* s3 is never NULL since s2 (formerly used for SSLv2) does not exist, so there isbcook2019-05-153-29/+20
* Remove unused pad check, which is handled by tls1_cbc_remove_padding() now.bcook2019-05-131-4/+2
* In DTLS, use_srtp is part of the extended server hello while in TLSv1.3,tb2019-05-081-2/+3
* Use calloc/freezero when allocating and freeing the session ticket data.jsing2019-04-251-4/+6
* Use EVP_CIPHER_CTX_{new,free}() and HMAC_CTX_{new,free}() instead ofjsing2019-04-251-24/+29
* Rename some variables in tls_decrypt_ticket().jsing2019-04-251-18/+18
* Convert tls_decrypt_ticket() to CBS.jsing2019-04-231-44/+72
* Provide a derr label (decode/decrypt error) in tls1_decrypt_ticket().jsing2019-04-221-41/+29
* Pass the session ID down to the session/ticket handling code as a CBS.jsing2019-04-224-35/+36
* Inline and remove the tlsext_tick_md macro.jsing2019-04-223-6/+5
* Clean up tls1_process_ticket().jsing2019-04-211-39/+43
* Cleanup more of tls_decrypt_ticket().jsing2019-04-211-5/+9
* Start cleaning up tls_decrypt_ticket().jsing2019-04-211-58/+63
* Avoid leak in SSL_dup_CA_list()tb2019-04-131-8/+14
* Recommend SSL_CTX_add1_chain_cert(3) rather thanschwarze2019-04-091-12/+11
* Document SSL_CTX_clear_mode(3) and SSL_clear_mode(3).schwarze2019-04-091-22/+48
* By design, our state machine is a DAG contrary to the state machine intb2019-04-054-7/+29
* Import SSL_CTX_add1_chain_cert(3) from OpenSSL branch 1.1.1, which is stillschwarze2019-04-055-17/+264
* Zap two dead #defines that were unused since jsing deleted thetb2019-04-051-5/+1
* Implement legacy fallback for the TLS 1.3 client.jsing2019-04-043-8/+87
* Clean up the cipher/digest table mess.jsing2019-04-043-179/+45
* Bump libssl/libtls minors due to symbol addition.jsing2019-04-041-1/+1
* Provide SSL chain/cert chain APIs.jsing2019-04-043-2/+161
* This case also needs to be fatal.jsing2019-04-041-1/+2
* mark ERR_R_INTERNAL_ERROR instead of assert or _exit, sighderaadt2019-04-011-3/+3
* Correct subtle bug in sigalgs, only care about curve_nid if we arebeck2019-04-011-4/+4
* Clean up and simplify the client verify code:jsing2019-03-311-50/+49
* Strip out all of the pkey to sigalg and sigalg to pkey linkages.jsing2019-03-255-59/+8
* tls1_process_sigalgs() is no longer needed.jsing2019-03-252-57/+2
* Defer sigalgs selection until the certificate is known.jsing2019-03-259-48/+124
* Rework ssl_ctx_use_certificate_chain_bio() to use the CERT_PKEY chain.jsing2019-03-251-46/+26
* Remove ssl_get_server_send_cert() which is now unused.jsing2019-03-252-14/+2
* Rework ssl3_output_cert_chain() to take a CERT_PKEY and consider chains.jsing2019-03-254-40/+36
* Add a chain member to CERT_PKEY and provide functions for manipulating it.jsing2019-03-252-3/+74
* If ssl_cipher_apply_rule() is given a specific cipher suite, match on it.jsing2019-03-241-3/+4
* do not call assert(), which has a tendency to leave traces of stuff inderaadt2019-03-241-2/+3
* Avoid an internal 2 byte overread in ssl_sigalgs().jsing2019-03-191-7/+2