summaryrefslogtreecommitdiff
path: root/src/lib/libtls/tls_config.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* when using fake keys, skip the private key checkeric2021-01-211-1/+2
* Allow setting a keypair on a tls context without specifying the privateeric2021-01-211-3/+11
* Destroy the mutex in tls_config objects when tls_config_free is called.bcook2020-12-221-1/+3
* Revert call to pthread_mutex_destroy until installers have a stub.bcook2020-12-221-3/+1
* Destroy the mutex in a tls_config object when tls_config_free is called.bcook2020-12-211-1/+3
* Add support for TLSv1.3 as a protocol to libtls.jsing2020-01-201-1/+3
* Allow portable to override the default CA bundle locationbeck2019-11-161-2/+2
* Switch to pthread_mutex_init().jsing2019-04-041-3/+5
* Add a mutex to guard reference counting for tls_config.jsing2019-04-011-2/+9
* remove duplicate set key file call. from alf.tedu2019-03-271-3/+1
* expose the default cert file as a function, not a define. it's reallytedu2018-11-291-1/+9
* Correct tls_config_clear_keys() behaviour.jsing2018-04-071-5/+2
* Avoid potentially calling strchr() on a NULL pointer injsing2018-03-201-7/+6
* Automatically handle library initialisation for libtls.jsing2018-03-191-2/+11
* Move the keypair pubkey hash handling code to during config.jsing2018-02-101-7/+11
* Add support to libtls for client-side TLS session resumption.jsing2018-02-101-1/+40
* Split keypair handling out into its own file - it had already appearedjsing2018-02-081-125/+6
* Be consistent with the goto label names used in libtls code.jsing2018-02-051-10/+10
* Make tls_config_parse_protocols() work correctly when passed a NULL pointerjsing2017-12-091-3/+5
* If tls_config_parse_protocols() is called with a NULL pointer, return thejsing2017-09-251-1/+4
* Add a tls_config_set_ecdhecurves() function to libtls, which allows thejsing2017-08-101-12/+72
* Don't use tls_cert_hash for the hashing used by the engine offloading magicclaudio2017-08-091-2/+2
* Add support for providing CRLs to libtls - once a CRL is provided wejsing2017-07-061-1/+17
* Perform reference counting for tls_config. This allows tls_config_free() tojsing2017-05-061-1/+6
* use freezero() instead of memset/explicit_bzero + free. Substantiallyderaadt2017-05-021-4/+2
* Add a tls_keypair_clear_key() function that uses freezero() to make keyjsing2017-04-301-5/+11
* Internal changes to allow for relayd engine privsep. sends the hash of thebeck2017-04-051-1/+8
* Add tls_config_[add|set]keypair_ocsp functions so that ocsp staples may bebeck2017-01-311-14/+99
* Move the ocsp staple to being part of the keypair structure internally,beck2017-01-291-5/+21
* Introduce ticket support. To enable them it is enough to set a positiveclaudio2017-01-241-1/+101
* Change the return value of tls_config_set_protocols() andjsing2016-11-111-5/+11
* Add support for server side OCSP stapling to libtls.beck2016-11-051-1/+15
* Make the tls_keypair_new() function a valid prototype.jsing2016-11-041-2/+2
* Avoid another signed vs unsigned comparison.jsing2016-11-041-2/+6
* Add ocsp_require_stapling config option for tls - allows a connectionbeck2016-11-041-1/+7
* Provide an API that enables server side SNI support - add the ability tojsing2016-08-221-1/+57
* Avoid leaking memory if tls_config_set_alpn() is called multiple timesjsing2016-08-131-4/+5
* Load CA, certificate and key files into memory when the appropriatejsing2016-08-131-13/+68
* Add ALPN support to libtls.jsing2016-08-121-1/+68
* Revert previous since it adds new symbols.jsing2016-08-021-69/+1
* Add ALPN support to libtls.jsing2016-08-011-1/+69
* Split the existing TLS cipher suite groups into four:jsing2016-07-131-3/+7
* Revert previous - it introduces problems with a common privsep use case.jsing2016-07-071-68/+11
* Check that the given ciphers string is syntactically valid and results injsing2016-07-061-1/+17
* Always load CA, key and certificate files at the time the configurationjsing2016-07-061-11/+68
* Rename some of the internal error setting functions to more closely followjsing2016-05-271-3/+3
* Avoid leaking ca_mem when freeing a tls_config.jsing2016-05-271-1/+2
* Factor our the keypair handling in libtls. This results in more readablejsing2016-04-281-14/+100
* Rework the error handling in libtls so that we can associate errors withjsing2016-04-281-3/+15
* clean some ugly intendation wartsderaadt2015-09-291-2/+2