summaryrefslogtreecommitdiff
path: root/src/lib/libtls/tls.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Remove spaces before tabstb2024-04-081-2/+2
* Add TLS_ERROR_INVALID_ARGUMENT error code to libtlsjoshua2024-03-271-8/+10
* Add TLS_ERROR_INVALID_CONTEXT error code to libtlsjoshua2024-03-261-3/+3
* Add error code support to libtlsjoshua2024-03-261-56/+96
* Use errno_value instead of num for readabilityjoshua2024-03-261-7/+7
* Use errno_value instead of num for readabilityjoshua2024-03-261-10/+10
* Remove the ability to do tls 1.0 and 1.1 from libtls.beck2023-07-021-7/+3
* libtls: switch ECDSA_METHOD usage to EC_KEY_METHODop2023-06-181-5/+5
* Forcibly update the EVP_PKEY's internal keyop2023-05-251-13/+25
* add missing #include <string.h>; ok tb@op2023-05-141-1/+2
* Plug a long standing leak in libtls CRL handlingtb2022-02-081-2/+1
* Introduce a signer interface intented to make TLS privsep simplereric2022-01-251-1/+19
* Switch from X509_VERIFY_PARAM_set_flags() to X509_STORE_set_flags().tb2021-10-211-2/+2
* Use *printf %d instead of %itb2021-10-211-2/+2
* Use SSL_CTX_get0_param() rather than reaching into the SSL_CTX.jsing2021-10-021-2/+2
* Use "EC/RSA key setup failure" to align error with otherstb2021-02-011-3/+3
* Move private key setup to a helper function with proper erroreric2021-01-261-10/+47
* return -1 on error for consistencyeric2021-01-211-2/+2
* Allow setting a keypair on a tls context without specifying the privateeric2021-01-211-22/+62
* Clear SSL_MODE_AUTO_RETRY in libtls, since we handle WANT_POLLIN correctly.jsing2020-05-241-1/+3
* Add support for TLSv1.3 as a protocol to libtls.jsing2020-01-201-1/+4
* Add a mutex to guard reference counting for tls_config.jsing2019-04-011-1/+3
* expose the default cert file as a function, not a define. it's reallytedu2018-11-291-2/+2
* Define TLS_CA_CERT_FILE rather than having every application create theirjsing2018-11-061-2/+2
* Switch to OPENSSL_init_ssl() and prevent an openssl configuration file fromjsing2018-04-071-3/+2
* Automatically handle library initialisation for libtls.jsing2018-03-191-3/+2
* un-revert tls_init pthread_once change, now that stub is added so that builds...beck2018-03-081-12/+20
* backout. diff was not tested comprehensively, resulting in a broken tree.deraadt2018-03-071-20/+12
* Make tls_init() concurrently callable using pthread_once().beck2018-03-071-12/+20
* Move the keypair pubkey hash handling code to during config.jsing2018-02-101-4/+29
* Have tls_keypair_pubkey_hash() call tls_keypair_load_cert() instead ofjsing2018-02-081-2/+3
* Move tls_keypair_pubkey_hash() to the keypair file.jsing2018-02-081-41/+1
* Avoid a memory leak that results when the same tls_config is reused.jsing2018-02-081-1/+4
* Keep track of which keypair is in use by a TLS context.jsing2017-09-201-1/+4
* Fix unchecked return nitbeck2017-08-281-2/+5
* Don't use tls_cert_hash for the hashing used by the engine offloading magicclaudio2017-08-091-7/+20
* Add support for providing CRLs to libtls - once a CRL is provided wejsing2017-07-061-1/+41
* Use the tls_password_cb() callback with all PEM_read_bio_*() calls, so thatjsing2017-06-221-6/+6
* Fix incorrect indentation.jsing2017-06-221-2/+2
* Plug a memory leak in tls_keypair_cert_hash(), introduced in r1.60.jsing2017-06-221-1/+3
* Remove dead code that has remained hiding since ressl.c r1.14!jsing2017-06-221-4/+1
* Return an error if tls_handshake() is called on a TLS context that hasjsing2017-05-071-1/+6
* Perform reference counting for tls_config. This allows tls_config_free() tojsing2017-05-061-3/+10
* Add tls_peer_cert_chain_pem - To retreive the peer certificate and chainbeck2017-04-051-1/+4
* Internal changes to allow for relayd engine privsep. sends the hash of thebeck2017-04-051-2/+65
* Use a flag to track when we need to call SSL_shutdown(). This avoids anjsing2017-01-261-2/+3
* Disable session cache and tickets by default.claudio2017-01-221-1/+5
* whitespacederaadt2017-01-131-3/+3
* If certificate verification has been disabled, do not attempt to load ajsing2017-01-031-5/+9
* Revert previous - the original code was correct since X509_verify_cert()jsing2017-01-031-5/+5