summaryrefslogtreecommitdiff
path: root/src/lib/libtls (follow)
Commit message (Expand)AuthorAgeFilesLines
* If tls_config_parse_protocols() is called with a NULL pointer, return thejsing2017-09-251-1/+4
* Keep track of which keypair is in use by a TLS context.jsing2017-09-204-14/+25
* Slightly restructure tls_ocsp_verify_cb() to make it more like libtls code.jsing2017-09-201-6/+7
* Provide a useful error if there are no OCSP URLs in the peer certificate.jsing2017-09-201-1/+4
* Fix indentation.jsing2017-09-201-1/+1
* Bump libssl/libtls minors due to symbol (re)addition.jsing2017-08-301-1/+1
* Bump lib{crypto,ssl,tls} majors due to symbol removals.jsing2017-08-281-2/+2
* Fix unchecked return nitbeck2017-08-281-2/+5
* Make the symbol for ASN1_time_tm_clamp_notafter visible so libtlsbeck2017-08-271-1/+5
* Switch to -Werror with clang for libressl.doug2017-08-131-2/+2
* Document tls_config_set_dheparams().jsing2017-08-121-4/+13
* Document tls_reset().jsing2017-08-121-2/+13
* new sentence, new line;jmc2017-08-111-3/+4
* Bump minor due to symbol addition.jsing2017-08-111-1/+1
* Add a tls_config_set_ecdhecurves() function to libtls, which allows thejsing2017-08-107-34/+108
* Don't use tls_cert_hash for the hashing used by the engine offloading magicclaudio2017-08-093-11/+24
* correct function name;jmc2017-08-011-3/+3
* Document tls_config_set_crl_file() and tls_config_set_crl_mem().jsing2017-07-061-3/+30
* Bump minor due to symbol addition.jsing2017-07-061-1/+1
* Add support for providing CRLs to libtls - once a CRL is provided wejsing2017-07-065-4/+67
* RFC 6066 states that IP literals are not permitted in "HostName" for ajsing2017-07-051-3/+9
* Use the tls_password_cb() callback with all PEM_read_bio_*() calls, so thatjsing2017-06-224-11/+14
* Fix incorrect indentation.jsing2017-06-221-2/+2
* Plug a memory leak in tls_keypair_cert_hash(), introduced in r1.60.jsing2017-06-221-1/+3
* Remove dead code that has remained hiding since ressl.c r1.14!jsing2017-06-221-4/+1
* Use the standard `rv' idiom in tls_keypair_load_cert(), rather thanjsing2017-06-221-5/+4
* Plug a memory leak. The main_cert needs to be X509_free()ed sinceclaudio2017-05-161-0/+2
* Ensure that a client context has been connected before attempting tojsing2017-05-072-4/+12
* Return an error if tls_handshake() is called on a TLS context that hasjsing2017-05-071-1/+6
* Use freezero() for the tls_load_file() failure case, since we'rejsing2017-05-061-4/+4
* BIO_free_all() and EVP_PKEY_free() can be called with NULL.jsing2017-05-061-5/+3
* Be explicit about when it is safe to call tls_config_free().jsing2017-05-061-3/+8
* Document tls_unload_file().jsing2017-05-061-3/+14
* Perform reference counting for tls_config. This allows tls_config_free() tojsing2017-05-064-6/+22
* Provide a tls_unload_file() function, that frees the memory returned fromjsing2017-05-063-2/+10
* Bump minors for symbol addition in libcryptobeck2017-05-061-1/+1
* Move tls_config_skip_private_key_check() out from under HIDDEN_DECLS.claudio2017-05-041-2/+4
* use freezero() instead of memset/explicit_bzero + free. Substantiallyderaadt2017-05-021-4/+2
* Only enable -Werror on libcrypto/libssl/libtls if we are building withjsing2017-04-301-2/+5
* Add a tls_keypair_clear_key() function that uses freezero() to make keyjsing2017-04-301-5/+11
* tls_free(3) and tls_config_free(3) accept NULL;schwarze2017-04-272-4/+14
* Rework name verification code so that a match is indicated via an argument,jsing2017-04-105-47/+76
* Use uint8_t instead of u_int8_t - for consistency and to make things easierjsing2017-04-071-2/+2
* Add tls_peer_cert_chain_pem - To retreive the peer certificate and chainbeck2017-04-057-6/+77
* Internal changes to allow for relayd engine privsep. sends the hash of thebeck2017-04-055-29/+87
* fix error in Dt; from robert kleinjmc2017-03-021-3/+3
* Bump minors due to symbol addition.jsing2017-02-281-1/+1
* spelling fix;jmc2017-02-201-2/+2
* document tls_config_error(3) RETURN VALUES, improve what is saidschwarze2017-02-202-6/+59
* tweak previous;jmc2017-01-312-12/+8