summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Expand)AuthorAgeFilesLines
* document X509V3_EXT_print(3)schwarze2021-07-125-8/+167
* While the traditional OpenSSL return value and behaviour of BIO_dump(3)beck2021-07-112-31/+17
* new manual page ASN1_parse_dump(3)schwarze2021-07-115-7/+222
* document ASN1_get_object(3)schwarze2021-07-114-5/+207
* Fix a read buffer overrun in X509_CERT_AUX_print(3),schwarze2021-07-101-3/+3
* new manual page BIO_dump(3)schwarze2021-07-103-3/+149
* Add a bunch of workarond in the verifier to support partial chains andbeck2021-07-102-16/+135
* Fix mixup between localKeyID and friendlyName.tb2021-07-091-3/+3
* KNF: remove whitespace between functions and parenthesestb2021-07-096-28/+28
* new manual page for X509_keyid_set1(3), X509_keyid_get0(3),schwarze2021-07-095-9/+184
* document X509_add1_reject_object(3) and X509_reject_clear(3)schwarze2021-07-081-7/+24
* add new manual page for X509_add1_trust_object(3) and X509_trust_clear(3)schwarze2021-07-083-3/+87
* document X509_signature_dump(3) and X509_signature_print(3)schwarze2021-07-065-9/+97
* alarm(3) cannot fail, remove error handling.bluhm2021-07-061-3/+2
* Fix a bug in X509_print_ex(3).schwarze2021-07-061-3/+3
* document i2a_ASN1_OBJECT(3)schwarze2021-07-051-8/+61
* document X509_find_by_subject(3) and X509_find_by_issuer_and_serial(3)schwarze2021-07-043-3/+74
* Bugfix: when X509_NAME_dup(3) failed, X509_NAME_set(3) indicated successschwarze2021-07-041-14/+8
* Document X509_NAME_set(3).schwarze2021-07-031-3/+41
* Do a first pass clean up of SSL_METHOD.jsing2021-07-034-103/+14
* Garbage collect do_test_cipherlist().jsing2021-07-031-45/+0
* Add test that ensures ssl3_ciphers[] is sorted by cipher id.jsing2021-07-031-0/+37
* Rewrite get_put_test() as cipher_find_test().jsing2021-07-031-54/+25
* fix a bug that resulted in incomplete testing:schwarze2021-07-031-4/+4
* Document the read-only (sic!) accessor function X509_NAME_ENTRY_set(3).schwarze2021-07-021-9/+77
* Add a roff comment saying that X509_certificate_type(3) is intentionallyschwarze2021-07-021-2/+5
* call the API function X509_NAME_cmp(3) instead of the obsolete,schwarze2021-07-021-2/+2
* Add a roff comment saying that X509_name_cmp(3) is intentionallyschwarze2021-07-021-2/+4
* Merge SSL_METHOD_INTERNAL into SSL_METHOD.jsing2021-07-0115-195/+126
* Disable some code that reaches into libssl internals.jsing2021-06-301-0/+7
* Disable some tests that probably no longer make sense.jsing2021-06-301-0/+5
* Pull in ssl_locl.h to allow for move of struct ssl_session_st.jsing2021-06-302-2/+5
* Prepare to provide SSL_get_signature_nid() and friends.jsing2021-06-302-2/+81
* Move some structs from public to private headers.jsing2021-06-303-125/+108
* document and deprecate the macros X509_extract_key(3)schwarze2021-06-301-6/+35
* Correct sigalg hash usage when signing content for client verify.jsing2021-06-301-3/+2
* Pull sigalg selection up into ssl3_send_client_verify().jsing2021-06-291-14/+11
* Track sigalg used by ourselves and our peer in the legacy stack.jsing2021-06-292-2/+6
* Pull up and dedup the TLS version check in ssl_sigalg_pkey_ok().jsing2021-06-291-5/+6
* Simplify RSA PSS key size comment.jsing2021-06-291-5/+2
* Use appropriate TLS version when building client sigalg extensions.jsing2021-06-291-2/+6
* Change ssl_sigalg_from_value() to take SSL * instead of a TLS version.jsing2021-06-291-7/+6
* Make various sigalg functions static now that they're only used internally.jsing2021-06-292-10/+5
* Convert legacy stack server to ssl_sigalg_for_peer().jsing2021-06-291-47/+29
* Convert legacy stack client to ssl_sigalg_for_peer().jsing2021-06-291-34/+12
* Provide a ssl_sigalg_for_peer() function and use in the TLSv1.3 code.jsing2021-06-294-15/+33
* Move the RSA-PSS check for TLSv1.3 to ssl_sigalg_pkey_ok().jsing2021-06-296-34/+29
* Factor out handling of legacy default signature algorithms.jsing2021-06-291-32/+27
* Mop up now unused variables.jsing2021-06-291-7/+2
* Require a ServerHello following a HelloRetryRequest to use the same cipher.jsing2021-06-291-2/+11