summaryrefslogtreecommitdiff
path: root/src/lib/libtls/tls.c (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Various clean up and reorganisation of the connection info handling code.jsing2016-08-221-8/+5
* Create contexts for server side SNI - these include the additional SSL_CTXjsing2016-08-221-1/+27
* Explicitly pass in an SSL_CTX * to the functions that operate on one,jsing2016-08-151-23/+21
* Load CA, certificate and key files into memory when the appropriatejsing2016-08-131-27/+25
* Add ALPN support to libtls.jsing2016-08-121-1/+9
* Revert previous since it adds new symbols.jsing2016-08-021-9/+1
* Add ALPN support to libtls.jsing2016-08-011-1/+9
* Revert previous - it introduces problems with a common privsep use case.jsing2016-07-071-3/+20
* Always load CA, key and certificate files at the time the configurationjsing2016-07-061-20/+3
* Correctly handle an EOF that occurs prior to the TLS handshake completing.jsing2016-07-061-3/+6
* Rename some of the internal error setting functions to more closely followjsing2016-05-271-8/+36
* Factor our the keypair handling in libtls. This results in more readablejsing2016-04-281-22/+23
* Rework the error handling in libtls so that we can associate errors withjsing2016-04-281-15/+44
* Call BIO_sock_init() from tls_init() to ensure sockets are enabled on Windows.bcook2016-01-181-1/+4
* Allow us to get cipher and version even if there is not a peer certificate.beck2015-10-071-5/+6
* clean some ugly intendation wartsderaadt2015-09-291-2/+2
* Provide tls_config_insecure_noverifytime() in order to be able to disablejsing2015-09-141-1/+6
* Expose EOF without close-notify via tls_close().jsing2015-09-141-4/+11
* Return an error if tls_handshake() or tls_close() is called on a contextjsing2015-09-141-2/+13
* work around the stupid semantics of SSL_read and SSL_write to make surebeck2015-09-131-3/+3
* Don't leak conninfo - spotted by marko kreen.beck2015-09-131-2/+3
* Move connection info into it's own private structure allocated and filled inbeck2015-09-121-4/+13
* Ensure that we clear the libssl error stack before we make a function calljsing2015-09-121-3/+6
* Store a reference to the peer certificate (if any) upon completion of thejsing2015-09-111-1/+6
* Call tls_set_errorx() instead of tls_set_error() injsing2015-09-101-5/+5
* comment for errno clobbering, to indicate why we do this.beck2015-09-101-1/+5
* change TLS_READ_AGAIN to TLS_WANT_POLLIN and TLS_WRITE_AGAIN to TLS_WANT_POLLOUTbeck2015-09-101-4/+4
* Change tls_read and tls_write semantics to return an ssize_t to betterbeck2015-09-101-17/+11
* Split tls_handshake() out from tls_accept/tls_connect. By doing this thejsing2015-09-101-5/+30
* Indent labels with a space so that diff -p is more friendly.jsing2015-09-091-4/+4
* Add client certificate support. Still needs a few tweaks but this willbeck2015-09-091-2/+40
* always clear errno when coming back from tls_read tls_write, and tls_close.beck2015-09-091-9/+20
* nuke trailing whitespacebeck2015-09-091-4/+3
* Improve libtls error messages.jsing2015-08-271-22/+65
* Split the persistent/configuration flags from temporary state flags andjsing2015-08-271-1/+2
* Make tls_read()/tls_write always set outlen to zero on error - this gotjsing2015-08-221-5/+5
* Set SSL_MODE_ENABLE_PARTIAL_WRITE and SSL_MODE_ACCEPT_MOVING_WRITE_BUFFERbluhm2015-07-181-1/+4
* Treat SSL_ERROR_ZERO_RETURN as a success, rather than a failure. Alsojsing2015-04-151-5/+6
* Make tls_close() more robust - do not rely on a close notify being receivedjsing2015-04-151-13/+17
* Handle the case where multiple calls to SSL_shutdown() are required tojsing2015-04-021-6/+9
* Store errors that occur during a tls_accept_socket() call on the contextjsing2015-03-311-5/+5
* Convert tls_connect_fds() and tls_accept_socket() to the new OpenSSL errorjsing2015-02-071-2/+2
* Attempt to implement the OpenSSL error dance so that TLS read/writejsing2015-02-071-29/+61
* Rename SSL_CTX_use_certificate_chain() to SSL_CTX_use_certificate_chain_mem().reyk2015-02-061-2/+2
* Add size_t to int checks for SSL functions.doug2014-12-171-1/+22
* revert previous change for now, adjusting based on comments from jsing@bcook2014-12-071-10/+3
* Allow specific libtls hostname validation errors to propagate.bcook2014-12-071-3/+10
* Rename libressl to libtls to avoid confusion and to make it easier tojsing2014-10-311-0/+300