Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | The check_includes step is incorrect dependency management model for | deraadt | 2020-06-09 | 1 | -11/+1 |
| | | | | | | how our tree gets built. If this was done in all the libraries (imagine sys/dev), it would disrupt the development process hugely. So it should not be done here either. use 'make includes' by hand instead. | ||||
* | Clear SSL_MODE_AUTO_RETRY in libtls, since we handle WANT_POLLIN correctly. | jsing | 2020-05-24 | 1 | -1/+3 |
| | |||||
* | Correct includes check for libtls. | jsing | 2020-01-22 | 1 | -2/+2 |
| | |||||
* | Add checks to ensure that lib{crypto,ssl,tls} public headers have actually | jsing | 2020-01-22 | 1 | -1/+11 |
| | | | | | | been installed prior to building. Requested by and ok tb@ | ||||
* | Note in the man page that the default protocols list includes 1.3 | beck | 2020-01-22 | 1 | -4/+4 |
| | | | | ok jsing@ | ||||
* | Enable TLS version 1.3 in the default protocols for libtls. | beck | 2020-01-22 | 1 | -2/+2 |
| | | | | | | | This will as yet not do anything, until we turn it on in the lower level libraries. ok jsing@ | ||||
* | Add support for TLSv1.3 as a protocol to libtls. | jsing | 2020-01-20 | 4 | -11/+20 |
| | | | | | | | This makes tls_config_parse_protocols() recognise and handle "tlsv1.3". If TLSv1.3 is enabled libtls will also request libssl to enable it. ok beck@ tb@ | ||||
* | Add missing RCS tag. | tb | 2019-12-03 | 1 | -0/+1 |
| | |||||
* | Allow 1.3 ciphers in libtls. | beck | 2019-11-16 | 1 | -2/+2 |
| | | | | ok jsing@ | ||||
* | Allow portable to override the default CA bundle location | beck | 2019-11-16 | 2 | -3/+7 |
| | | | | ok kinichiro@ jsing@ | ||||
* | Bump libcrypto, libssl and libtls minors due to symbol additions. | jsing | 2019-11-02 | 1 | -1/+1 |
| | |||||
* | Document tls_conn_cipher_strength(). | jsing | 2019-11-02 | 1 | -2/+14 |
| | | | | ok schwarze@ | ||||
* | Provide tls_conn_cipher_strength(). | jsing | 2019-11-02 | 4 | -3/+15 |
| | | | | | | | | | This returns the strength in bits of the symmetric cipher used for the connection. Diff from gilles@ ok tb@ | ||||
* | Bump libcrypto, libssl and libtls majors due to changes in struct sizes | jsing | 2019-10-24 | 1 | -2/+2 |
| | | | | and symbol addition. | ||||
* | Group tls_{handshake,read,write,close}() return values documentation. | jsing | 2019-07-09 | 1 | -21/+21 |
| | | | | | | | | | | Move the documentation for tls_error() down so that both the special return values for tls_{handshake,read,write,close}() directly follow the standard return values for the same functions. Prompted by deraadt@. ok deraadt@ schwarze@ | ||||
* | tls_read() & tls_write() return 4 possible values: TLS_WANT_POLLOUT, | deraadt | 2019-06-20 | 1 | -4/+4 |
| | | | | | | TLS_WANT_POLLIN, -1, or 0. After handling the first two, check for -1 rather than vaguely "< 0". ok jsing | ||||
* | provide getters and setters for the RSA_METHOD interface | gilles | 2019-06-05 | 1 | -1/+1 |
| | | | | ok tb@, jsing@, sthen@ | ||||
* | Acquire mutex before incrementing the refcount. Fixes COV-186144 | bcook | 2019-05-13 | 1 | -1/+3 |
| | | | | ok tb@ | ||||
* | Null out pointers on asprintf() failure. | tb | 2019-04-13 | 1 | -3/+7 |
| | | | | | | | | These pointers will be passed to free. According to asprintf(3), "on OpenBSD, ret will be set to the null pointer, but this behavior should not be relied upon." ok jsing | ||||
* | Only assign destlen when src is non-NULL. | jsing | 2019-04-04 | 1 | -3/+4 |
| | | | | This avoids ever having a non-zero len with a NULL pointer. | ||||
* | Switch to pthread_mutex_init(). | jsing | 2019-04-04 | 1 | -3/+5 |
| | | | | | | | While PTHREAD_MUTEX_INITIALIZER can be used on OpenBSD, some other platforms do not like it. Noted by bcook@ | ||||
* | Bump libssl/libtls minors due to symbol addition. | jsing | 2019-04-04 | 1 | -1/+1 |
| | |||||
* | Add a mutex to guard reference counting for tls_config. | jsing | 2019-04-01 | 3 | -4/+16 |
| | | | | | | | | This makes libtls more friendly for multithreaded use - otherwise we can end up with incorrect refcounts and end up freeing when we should not be (or not freeing when we should be). ok beck@ | ||||
* | remove duplicate set key file call. from alf. | tedu | 2019-03-27 | 1 | -3/+1 |
| | | | | ok jsing | ||||
* | fix examples (libtls uses its own error reporting mechanism) | espie | 2019-03-20 | 1 | -4/+4 |
| | | | | okay tb@ | ||||
* | bump minors after symbol addition | tb | 2019-03-17 | 1 | -1/+1 |
| | |||||
* | bump minors after symbol addition | tb | 2019-01-22 | 1 | -1/+1 |
| | |||||
* | bump minors after symbol addition | tb | 2019-01-19 | 1 | -1/+1 |
| | |||||
* | Delete a note taken during the rev. 1.1 man page splite | schwarze | 2018-12-14 | 1 | -5/+2 |
| | | | | | | that should have been deleted before commit. The cross reference is already present below SEE ALSO. Glitch noticed by jsing@. | ||||
* | missed adding tls_default_ca_cert_file here. found by sthen | tedu | 2018-11-29 | 1 | -0/+1 |
| | |||||
* | expose the default cert file as a function, not a define. it's really | tedu | 2018-11-29 | 5 | -10/+24 |
| | | | | | | an internal detail of the library, so the string should live inside it, not in the application code. ok jsing | ||||
* | bump minors after symbol addition. | tb | 2018-11-11 | 1 | -1/+1 |
| | |||||
* | Define TLS_CA_CERT_FILE rather than having every application create their | jsing | 2018-11-06 | 3 | -6/+6 |
| | | | | | | own define for /etc/ssl/cert.pem. ok beck@ bluhm@ tb@ | ||||
* | Bump libcrypto/libssl/libtls majors due to symbol removals (libcrypto) | jsing | 2018-10-24 | 1 | -2/+2 |
| | | | | and changes to struct visibility/sizes (libssl). | ||||
* | crank to follow minor crank in libcrypto; ok tb@ jsing@ | djm | 2018-09-12 | 1 | -1/+1 |
| | |||||
* | crank majors after symbol addition/modification/removal | tb | 2018-08-24 | 1 | -2/+2 |
| | |||||
* | typo in argument type, from Mario dot Andres dot Campos at gmail dot com | schwarze | 2018-08-21 | 1 | -3/+3 |
| | |||||
* | Use the same order in NAME, SYNOPSIS, DESCRIPTION, and RETURN VALUES to | tb | 2018-07-24 | 1 | -27/+28 |
| | | | | | | | improve readability and ease of maintenance. Positive feedback jmc Detailed suggestion & ok schwarze | ||||
* | Document tls_peer_ocsp_result() and use it in place of the non-existent | tb | 2018-07-23 | 1 | -6/+12 |
| | | | | | | | tls_peer_ocsp_result_msg() in the documentation. input & ok jsing Reads fine to jmc and makes sense to schwarze | ||||
* | Move a detail on tls_connect(3) to its documentation and be a bit more | tb | 2018-07-09 | 1 | -5/+7 |
| | | | | | | explicit about the servername argument of tls_connect_servername(3). input & ok jsing, input & ok schwarze on earlier version | ||||
* | wording tweak for tls_init() from jsing | tb | 2018-07-09 | 1 | -4/+4 |
| | | | | ok jsing, schwarze | ||||
* | Simplify and shorten the description of tls_init(3), | schwarze | 2018-07-08 | 1 | -4/+4 |
| | | | | | fixing an awkward wording noticed by tb@. OK tb@ | ||||
* | minor markup improvement: .Fa *cctx -> .Pf * Fa cctx | schwarze | 2018-05-26 | 1 | -3/+3 |
| | |||||
* | Quote .Fa arguments containing blanks. | schwarze | 2018-05-26 | 1 | -4/+4 |
| | | | | Diff from Jack Burton <jack at saosce dot com dot au>. | ||||
* | Correct tls_config_clear_keys() behaviour. | jsing | 2018-04-07 | 3 | -30/+18 |
| | | | | | | | | | | | | | Previously this incorrectly called tls_keypair_clear(), which results in the private key being cleared, along with the certificate, OCSP staple and pubkey hash. This breaks OCSP stapling if tls_config_clear_keys() is called following tls_configure(), as is done by httpd. Fix this by calling tls_keypair_clear_key() so that only the private key is cleared, leaving the other public data untouched. While here, remove tls_keypair_clear() and fold the necessary parts into tls_keypair_free(). ok beck@ | ||||
* | Switch to OPENSSL_init_ssl() and prevent an openssl configuration file from | jsing | 2018-04-07 | 1 | -3/+2 |
| | | | | | | being loaded behind our back, at a later point. ok beck@ | ||||
* | Avoid potentially calling strchr() on a NULL pointer in | jsing | 2018-03-20 | 1 | -7/+6 |
| | | | | | | tls_config_set_ecdhecurve(). Spotted by Coverity. | ||||
* | bump minors after symbol addition | tb | 2018-03-20 | 1 | -1/+1 |
| | |||||
* | Automatically handle library initialisation for libtls. | jsing | 2018-03-19 | 6 | -11/+28 |
| | | | | | | | | | Now that we have tls_init() under pthread_once(), automatically initialise libtls from the entry point functions (tls_config(), tls_client() and tls_server()) - this makes an explicit tls_init() call no longer a requirement. ok bcook@ beck@ inoguchi@ | ||||
* | crank majors | tb | 2018-03-17 | 1 | -2/+2 |
| | | | | req by deraadt |