summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Expand)AuthorAgeFilesLines
* new manual page for X509_keyid_set1(3), X509_keyid_get0(3),schwarze2021-07-095-9/+184
* document X509_add1_reject_object(3) and X509_reject_clear(3)schwarze2021-07-081-7/+24
* add new manual page for X509_add1_trust_object(3) and X509_trust_clear(3)schwarze2021-07-083-3/+87
* document X509_signature_dump(3) and X509_signature_print(3)schwarze2021-07-065-9/+97
* alarm(3) cannot fail, remove error handling.bluhm2021-07-061-3/+2
* Fix a bug in X509_print_ex(3).schwarze2021-07-061-3/+3
* document i2a_ASN1_OBJECT(3)schwarze2021-07-051-8/+61
* document X509_find_by_subject(3) and X509_find_by_issuer_and_serial(3)schwarze2021-07-043-3/+74
* Bugfix: when X509_NAME_dup(3) failed, X509_NAME_set(3) indicated successschwarze2021-07-041-14/+8
* Document X509_NAME_set(3).schwarze2021-07-031-3/+41
* Do a first pass clean up of SSL_METHOD.jsing2021-07-034-103/+14
* Garbage collect do_test_cipherlist().jsing2021-07-031-45/+0
* Add test that ensures ssl3_ciphers[] is sorted by cipher id.jsing2021-07-031-0/+37
* Rewrite get_put_test() as cipher_find_test().jsing2021-07-031-54/+25
* fix a bug that resulted in incomplete testing:schwarze2021-07-031-4/+4
* Document the read-only (sic!) accessor function X509_NAME_ENTRY_set(3).schwarze2021-07-021-9/+77
* Add a roff comment saying that X509_certificate_type(3) is intentionallyschwarze2021-07-021-2/+5
* call the API function X509_NAME_cmp(3) instead of the obsolete,schwarze2021-07-021-2/+2
* Add a roff comment saying that X509_name_cmp(3) is intentionallyschwarze2021-07-021-2/+4
* Merge SSL_METHOD_INTERNAL into SSL_METHOD.jsing2021-07-0115-195/+126
* Disable some code that reaches into libssl internals.jsing2021-06-301-0/+7
* Disable some tests that probably no longer make sense.jsing2021-06-301-0/+5
* Pull in ssl_locl.h to allow for move of struct ssl_session_st.jsing2021-06-302-2/+5
* Prepare to provide SSL_get_signature_nid() and friends.jsing2021-06-302-2/+81
* Move some structs from public to private headers.jsing2021-06-303-125/+108
* document and deprecate the macros X509_extract_key(3)schwarze2021-06-301-6/+35
* Correct sigalg hash usage when signing content for client verify.jsing2021-06-301-3/+2
* Pull sigalg selection up into ssl3_send_client_verify().jsing2021-06-291-14/+11
* Track sigalg used by ourselves and our peer in the legacy stack.jsing2021-06-292-2/+6
* Pull up and dedup the TLS version check in ssl_sigalg_pkey_ok().jsing2021-06-291-5/+6
* Simplify RSA PSS key size comment.jsing2021-06-291-5/+2
* Use appropriate TLS version when building client sigalg extensions.jsing2021-06-291-2/+6
* Change ssl_sigalg_from_value() to take SSL * instead of a TLS version.jsing2021-06-291-7/+6
* Make various sigalg functions static now that they're only used internally.jsing2021-06-292-10/+5
* Convert legacy stack server to ssl_sigalg_for_peer().jsing2021-06-291-47/+29
* Convert legacy stack client to ssl_sigalg_for_peer().jsing2021-06-291-34/+12
* Provide a ssl_sigalg_for_peer() function and use in the TLSv1.3 code.jsing2021-06-294-15/+33
* Move the RSA-PSS check for TLSv1.3 to ssl_sigalg_pkey_ok().jsing2021-06-296-34/+29
* Factor out handling of legacy default signature algorithms.jsing2021-06-291-32/+27
* Mop up now unused variables.jsing2021-06-291-7/+2
* Require a ServerHello following a HelloRetryRequest to use the same cipher.jsing2021-06-291-2/+11
* Reject zero-length non-application data fragments in the legacy stack.jsing2021-06-291-1/+11
* Use the order action->sender == ctx->mode everywhere for consistency.tb2021-06-281-3/+3
* ctx->alert is not a boolean, so compare it explicitly against 0.tb2021-06-281-3/+3
* The state machine now takes care of setting the legacy state,tb2021-06-281-11/+1
* Expand info callback support for TLSv1.3tb2021-06-282-7/+187
* Track the sigalgs used by ourselves and our peer.jsing2021-06-273-9/+14
* Have ssl3_send_client_verify() pass *pkey to called functions.jsing2021-06-271-22/+11
* Change ssl_sigalgs_from_value() to perform sigalg list selection.jsing2021-06-276-32/+31
* Rename ssl_sigalg() to ssl_sigalg_from_value().jsing2021-06-276-17/+18