summaryrefslogtreecommitdiff
path: root/src/lib (follow)
Commit message (Expand)AuthorAgeFilesLines
* Unroll ASN1_ITEM_ref()job2021-09-021-1/+1
* Change OPENSSL_strdup() to strdup()job2021-09-021-1/+1
* Change OPENSSL_malloc to calloc()job2021-09-021-1/+2
* Repair unrolling of static ASN1_ITEM IPAddrBlocks_itjob2021-09-021-0/+11
* Make v3_addr and v3_asid extern constjob2021-09-021-2/+2
* Add err.h for X509error() and friendsjob2021-09-022-0/+2
* Fix OPENSSL_assert() and assert()job2021-09-022-35/+17
* Unroll ASN1_EX_TEMPLATE_TYPE IPAddrBlocksjob2021-09-021-4/+7
* Change the OPENSSL_strdup() to strdup()job2021-09-021-3/+4
* Fix header file includesjob2021-09-022-8/+9
* Move the error put functions from X509V3err() to X509V3error()job2021-09-022-52/+32
* Unroll ASN1_SEQUENCE() ASN1_CHOICE() ASN1_ITEM_TEMPLATE()job2021-09-022-46/+218
* OPENSSL_assert() is not appropriate in this contextjob2021-09-021-2/+3
* Replace ossl_assert()/assert() with OPENSSL_assert()job2021-09-022-14/+14
* We need to allow for either a CERTIFICATE or CERTIFICATE_STATUS messagebeck2021-09-021-2/+3
* Replace OPENSSL_free() with free()job2021-09-022-7/+7
* Unroll IMPLEMENT_ASN1_FUNCTIONS()job2021-09-022-8/+197
* Unroll DECLARE_ASN1_FUNCTIONS()job2021-09-021-9/+56
* Rename DEFINE_STACK_OF() to DECLARE_STACK_OF()job2021-09-021-4/+4
* Lay groundwork to support X.509 v3 extensions for IP Addresses and AS Identif...job2021-09-027-5/+2386
* Call the ocsp callback if present and we get no response, instead ofbeck2021-09-021-3/+2
* Correct the is_server flag in the call to the debug callback to be correct.beck2021-09-021-2/+2
* RFC 6066 section 8 allows the server MAY choose not send the CertificateStatusbeck2021-09-021-3/+37
* inet_ntop(3) needs sys/socket.h for AF_INET / AF_INET6 so add the headerclaudio2021-09-012-6/+5
* comment out the detailed description of SSL_get_servername(3),schwarze2021-09-011-7/+9
* Remove assignment of value that is never read.beck2021-09-011-2/+1
* Remove some dead code that was missed in an earlier cleanup andtb2021-08-311-4/+3
* Defragment DTLS.jsing2021-08-312-123/+48
* Remove a nonsensical s->version == TLS1_VERSION from DTLS code.jsing2021-08-311-6/+1
* whitespacetb2021-08-312-7/+7
* Clean up and simplify info and msg callbacks.jsing2021-08-308-127/+88
* Replace DTLS r_epoch with the read epoch from the TLSv1.2 record layer.jsing2021-08-305-27/+26
* Move to an AEAD nonce allocated in the TLSv1.2 record layer.jsing2021-08-301-45/+36
* sync with OpenSSL 1.1.1, which is still under a free license;schwarze2021-08-301-15/+107
* Ignore warning alert returns from servername callback in TLSv1.3tb2021-08-301-3/+7
* Revert previous change that changed our default return for unable tobeck2021-08-301-11/+5
* Fix Jan's regress in openssl/x509 to do what it says it does,beck2021-08-301-5/+11
* Don't call the verify callback twice on success.beck2021-08-291-2/+1
* Get rid of historical code to extract the roots in the legacy case.beck2021-08-283-78/+33
* Clean up and simplify ssl3_dispatch_alert() and ssl3_send_alert().jsing2021-08-281-30/+32
* Zap blanks before tabs.tb2021-08-281-4/+4
* Remove the "dump_chain" flag and code. This was a workaround for a problem wherebeck2021-08-282-16/+4
* Remove unused #include <assert.h>.tb2021-08-271-2/+1
* Fix various read buffer overflow when printing ASN.1 strings (which aretb2021-08-244-14/+20
* Pull roots out of the trust store in the legacy xsc when building chainsbeck2021-08-193-8/+26
* Import initial code for the SM2 ciphertb2021-08-187-0/+1870
* Add a check_trust call to the legacy chain validation on chain add, rememberingbeck2021-08-181-2/+10
* Refactor the legacy chain validation from the chain adding code into itsbeck2021-08-181-52/+70
* typo in commenttb2021-08-161-2/+2
* link X509_STORE_get_by_subject(3) and X509_ocspid_print(3) to the build,schwarze2021-08-061-1/+3