summaryrefslogtreecommitdiffstats
path: root/ssl/ssl_cert.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Make sure we use the correct SSL object when making a callbackMatt Caswell2024-11-071-1/+1
* Check file name for not being NULL before opening itЗишан Мирза2024-09-261-0/+9
* ssl: rework "e_os.h" inclusionsFdaSilvaYY2024-09-051-0/+2
* Copyright year updatesTomas Mraz2024-09-051-1/+1
* Speed up SSL_add_{file,dir}_cert_subjects_to_stackClemens Lang2024-08-011-9/+65
* Remove trailing whitespaceDimitri Papadopoulos2024-07-221-1/+1
* Make ssl_cert_info read-onlyHugo Landau2023-11-271-3/+3
* tls: update to structure based atomicsPauli2023-07-011-10/+4
* Fix regression of no-posix-io buildsTomas Mraz2023-04-251-3/+11
* RFC7250 (RPK) supportTodd Short2023-03-281-9/+46
* Coverity 1521490: resource leakPauli2023-03-151-1/+4
* first cut at sigalg loadingMichael Baentsch2023-02-241-19/+61
* Skip subdirectories in SSL_add_dir_cert_subjects_to_stack()olszomal2023-02-231-0/+14
* Add support for compressed certificates (RFC8879)Todd Short2022-10-181-7/+28
* Stop raising ERR_R_MALLOC_FAILURE in most placesRichard Levitte2022-10-051-22/+20
* SSL object refactoring using SSL_CONNECTION objectTomas Mraz2022-07-281-33/+73
* tls: ban SSL3, TLS1, TLS1.1 and DTLS1.0 at security level one and abovePauli2022-05-081-10/+4
* Update copyright yearMatt Caswell2022-05-031-1/+1
* Add SSL_(CTX_)?get0_(verify|chain)_cert_store functionsHugo Landau2022-04-061-0/+6
* [ssl] Add SSL_kDHEPSK and SSL_kECDHEPSK as PFS ciphersuites for SECLEVEL >= 3Nicola Tuveri2022-03-011-2/+3
* [ssl] Prefer SSL_k(EC)?DHE to the SSL_kE(EC)?DH aliasNicola Tuveri2022-03-011-1/+1
* add OSSL_STACK_OF_X509_free() for commonly used patternDr. David von Oheimb2021-12-211-6/+6
* Fix invalid handling of verify errors in libsslMatt Caswell2021-12-141-2/+13
* BIO_read_filename: fix return checkPeiwei Hu2021-11-161-2/+2
* Change TLS RC4 cipher strength check to be data driven.slontis2021-09-231-3/+0
* cross-reference the DH and RSA SECLEVEL to level of security mappingsHubert Kario2021-06-231-0/+5
* ssl: do not choose auto DH groups that are weaker than the security levelPauli2021-06-191-9/+24
* Fix NULL access in ssl_build_cert_chain() when ctx is NULL.Shane Lontis2021-03-031-1/+1
* Remove OPENSSL_NO_DH guards from libsslMatt Caswell2021-02-051-2/+1
* Update copyright yearRichard Levitte2021-01-281-1/+1
* Add X509_NAME_hash_ex() to be able to check if it failed due to unsupported SHA1Dr. David von Oheimb2021-01-131-1/+2
* Only disabled what we need to in a no-dh buildMatt Caswell2020-11-181-4/+3
* SSL: refactor all SSLfatal() callsRichard Levitte2020-11-111-3/+2
* Convert all {NAME}err() in ssl/ to their corresponding ERR_raise() callRichard Levitte2020-11-111-27/+25
* Rename OPENSSL_CTX prefix to OSSL_LIB_CTXDr. Matthias St. Pierre2020-10-151-4/+4
* Run the withlibctx.pl scriptMatt Caswell2020-10-011-7/+7
* Fix safestack issues in x509.hMatt Caswell2020-09-131-3/+0
* Add X509 related libctx changes.Shane Lontis2020-07-241-13/+22
* SSL: refactor ssl_cert_lookup_by_pkey() to work with provider side keysRichard Levitte2020-05-151-10/+11
* coverity 1462581 Dereference after null checkPauli2020-04-301-1/+4
* In OpenSSL builds, declare STACK for datatypes ...Rich Salz2020-04-241-0/+3
* Update copyright yearMatt Caswell2020-04-231-1/+1
* Use X509_STORE_CTX_new_with_libctx() in libsslMatt Caswell2020-04-091-2/+2
* Explicitly cache X509v3 extensions in libsslMatt Caswell2020-03-301-2/+11
* SSL: Document SSL_add_{file,dir,store}_cert_subjects_to_stack()Richard Levitte2019-11-121-39/+3
* X509_LOOKUP_store: new X509_LOOKUP_METHOD that works by OSSL_STORE URIRichard Levitte2019-11-031-0/+74
* Reorganize local header filesDr. Matthias St. Pierre2019-09-281-1/+1
* Replace FUNCerr with ERR_raise_dataRich Salz2019-08-021-2/+3
* Deprecate SYSerr, add new FUNCerr macroRich Salz2019-07-221-1/+1
* Add ERR_put_func_error, and use it.Rich Salz2019-07-221-1/+1