summaryrefslogtreecommitdiff
path: root/src/lib/libtls/tls_client.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Add TLS_ERROR_INVALID_CONTEXT error code to libtlsjoshua2024-03-261-4/+7
* Add error code support to libtlsjoshua2024-03-261-33/+54
* add missing #include <string.h>; ok tb@op2023-05-141-1/+2
* Eliminate a dead assignment and a weird cast. Adjust a comment totb2021-10-211-6/+3
* Update RFC reference. RFC 4366 was obsoleted by RFC 6066.tb2021-06-011-2/+2
* Avoid sending a trailing dot in SNI as a clienttb2021-06-011-6/+19
* Automatically handle library initialisation for libtls.jsing2018-03-191-1/+4
* Add support to libtls for client-side TLS session resumption.jsing2018-02-101-1/+127
* Add a tls_config_set_ecdhecurves() function to libtls, which allows thejsing2017-08-101-1/+9
* Ensure that a client context has been connected before attempting tojsing2017-05-071-1/+8
* Rework name verification code so that a match is indicated via an argument,jsing2017-04-101-7/+7
* Use a flag to track when we need to call SSL_shutdown(). This avoids anjsing2017-01-261-1/+3
* If tls_set_cbs() fails an error will already be specified, so do notjsing2017-01-121-4/+2
* Hook up a certificate verify callback so that we can set user friendlyjsing2016-12-261-4/+2
* Add OCSP client side support to libtls.beck2016-11-021-1/+11
* Maintain consistency with function naming.jsing2016-09-041-4/+4
* Add callback-based interface to libtls.bcook2016-09-041-20/+56
* Explicitly pass in an SSL_CTX * to the functions that operate on one,jsing2016-08-151-5/+6
* Factor our the keypair handling in libtls. This results in more readablejsing2016-04-281-2/+2
* fix a gotcha in the connect refactoring, that could result in droppingderaadt2015-10-091-1/+5
* If getaddrinfo() succeeds, then don't try look ups with other flags, evenguenther2015-10-081-41/+39
* Instead of declaring a union in multiple places, move it to tls_internal.h.jsing2015-09-291-5/+2
* clean some ugly intendation wartsderaadt2015-09-291-2/+5
* Ensure that we clear the libssl error stack before we make a function calljsing2015-09-121-1/+3
* add tls_peer functions for checking names and issuers of peer certificates.beck2015-09-111-2/+2
* Split tls_handshake() out from tls_accept/tls_connect. By doing this thejsing2015-09-101-21/+37
* Indent labels with a space so that diff -p is more friendly.jsing2015-09-091-4/+4
* Add client certificate support. Still needs a few tweaks but this willbeck2015-09-091-26/+6
* Only take ownership of a socket if we allocated it within libtls. If we arejsing2015-09-091-3/+3
* Remove the default HTTPS port from tls_connect() - this is a TLS library,jsing2015-09-081-3/+5
* Improve libtls error messages.jsing2015-08-271-17/+17
* Split the persistent/configuration flags from temporary state flags andjsing2015-08-271-7/+7
* SSL_set_app_data is a macro for SSL_set_ex_data(), which is a wrapperjsing2015-08-221-3/+5
* Store a reference to the libtls context in the SSL client connection appjsing2015-08-221-1/+3
* Store errors that occur during a tls_accept_socket() call on the contextjsing2015-03-311-2/+2
* free the server certificate in tls_connect_fds(); fixes a memory leak withsthen2015-03-211-1/+2
* Provide a tls_connect_servername() function that has the same behaviourjsing2015-02-111-3/+12
* Be consistent with naming - only use "host" and "hostname" when referringjsing2015-02-111-15/+15
* When parsing the host in tls_connect(), first check if it is a numericreyk2015-02-091-29/+49
* Use the AI_ADDRCONFIG flag in tls_connect(). This tells the resolverreyk2015-02-081-1/+2
* Convert tls_connect_fds() and tls_accept_socket() to the new OpenSSL errorjsing2015-02-071-12/+6
* Make the TLS connect and accept error messages consistent.bluhm2015-01-301-2/+2
* Allow to to load the CA chain directly from memory instead ofreyk2015-01-221-2/+15
* For non-blocking sockets tls_connect_fds() could fail with EAGAIN.bluhm2015-01-131-5/+19
* Rename the tls_connect_socket() parameter 'socket' to 's' to avoidbluhm2015-01-021-4/+4
* include netinet/in.h to define struct in6_addr.bcook2014-12-271-1/+2
* Allow specific libtls hostname validation errors to propagate.bcook2014-12-071-4/+5
* revert previous change for now, adjusting based on comments from jsing@bcook2014-12-071-6/+4
* Allow specific libtls hostname validation errors to propagate.bcook2014-12-071-4/+6
* Add a tls_connect_fds() function that allows a secure connection to bejsing2014-11-021-3/+16