summaryrefslogtreecommitdiff
path: root/ssl/ssl_cert.c
Commit message (Expand)AuthorAgeFilesLines
* SSL object refactoring using SSL_CONNECTION objectTomas Mraz2022-07-281-33/+73
* tls: ban SSL3, TLS1, TLS1.1 and DTLS1.0 at security level one and abovePauli2022-05-081-10/+4
* Update copyright yearMatt Caswell2022-05-031-1/+1
* Add SSL_(CTX_)?get0_(verify|chain)_cert_store functionsHugo Landau2022-04-061-0/+6
* [ssl] Add SSL_kDHEPSK and SSL_kECDHEPSK as PFS ciphersuites for SECLEVEL >= 3Nicola Tuveri2022-03-011-2/+3
* [ssl] Prefer SSL_k(EC)?DHE to the SSL_kE(EC)?DH aliasNicola Tuveri2022-03-011-1/+1
* add OSSL_STACK_OF_X509_free() for commonly used patternDr. David von Oheimb2021-12-211-6/+6
* Fix invalid handling of verify errors in libsslMatt Caswell2021-12-141-2/+13
* BIO_read_filename: fix return checkPeiwei Hu2021-11-161-2/+2
* Change TLS RC4 cipher strength check to be data driven.slontis2021-09-231-3/+0
* cross-reference the DH and RSA SECLEVEL to level of security mappingsHubert Kario2021-06-231-0/+5
* ssl: do not choose auto DH groups that are weaker than the security levelPauli2021-06-191-9/+24
* Fix NULL access in ssl_build_cert_chain() when ctx is NULL.Shane Lontis2021-03-031-1/+1
* Remove OPENSSL_NO_DH guards from libsslMatt Caswell2021-02-051-2/+1
* Update copyright yearRichard Levitte2021-01-281-1/+1
* Add X509_NAME_hash_ex() to be able to check if it failed due to unsupported SHA1Dr. David von Oheimb2021-01-131-1/+2
* Only disabled what we need to in a no-dh buildMatt Caswell2020-11-181-4/+3
* SSL: refactor all SSLfatal() callsRichard Levitte2020-11-111-3/+2
* Convert all {NAME}err() in ssl/ to their corresponding ERR_raise() callRichard Levitte2020-11-111-27/+25
* Rename OPENSSL_CTX prefix to OSSL_LIB_CTXDr. Matthias St. Pierre2020-10-151-4/+4
* Run the withlibctx.pl scriptMatt Caswell2020-10-011-7/+7
* Fix safestack issues in x509.hMatt Caswell2020-09-131-3/+0
* Add X509 related libctx changes.Shane Lontis2020-07-241-13/+22
* SSL: refactor ssl_cert_lookup_by_pkey() to work with provider side keysRichard Levitte2020-05-151-10/+11
* coverity 1462581 Dereference after null checkPauli2020-04-301-1/+4
* In OpenSSL builds, declare STACK for datatypes ...Rich Salz2020-04-241-0/+3
* Update copyright yearMatt Caswell2020-04-231-1/+1
* Use X509_STORE_CTX_new_with_libctx() in libsslMatt Caswell2020-04-081-2/+2
* Explicitly cache X509v3 extensions in libsslMatt Caswell2020-03-301-2/+11
* SSL: Document SSL_add_{file,dir,store}_cert_subjects_to_stack()Richard Levitte2019-11-121-39/+3
* X509_LOOKUP_store: new X509_LOOKUP_METHOD that works by OSSL_STORE URIRichard Levitte2019-11-031-0/+74
* Reorganize local header filesDr. Matthias St. Pierre2019-09-281-1/+1
* Replace FUNCerr with ERR_raise_dataRich Salz2019-08-021-2/+3
* Deprecate SYSerr, add new FUNCerr macroRich Salz2019-07-221-1/+1
* Add ERR_put_func_error, and use it.Rich Salz2019-07-221-1/+1
* Move 'shared_sigalgs' from cert_st to ssl_stBenjamin Kaduk2019-06-261-3/+0
* Collapse ssl3_state_st (s3) into ssl_stTodd Short2019-04-291-2/+2
* Following the license change, modify the boilerplates in ssl/Richard Levitte2018-12-061-1/+1
* Separate ca_names handling for client and serverMatt Caswell2018-11-121-6/+7
* Unbreak SECLEVEL 3 regression causing it to not accept any ciphers.Tomas Mraz2018-11-101-2/+2
* Rename SSL[_CTX]_add1_CA_list -> SSL[_CTX]_add1_to_CA_listRichard Levitte2018-09-031-2/+6
* Allow TLS-1.3 ciphersuites in @SECLEVEL=3 and aboveTomas Mraz2018-08-221-1/+2
* Check that the public key OID matches the sig algMatt Caswell2018-07-181-9/+22
* Allow NULL for some _free routines.Rich Salz2018-03-271-0/+2
* Remove some code for a contributor that we cannot findMatt Caswell2018-03-271-3/+0
* Update copyright years on all files merged since Jan 1st 2018Richard Levitte2018-01-091-1/+1
* Avoid only exact duplicates when creating the accepted CA names listTomas Mraz2018-01-081-4/+23
* Consistent formatting for sizeof(foo)Rich Salz2017-12-071-3/+3
* Simplify the stack reservationPaul Yang2017-10-261-5/+1
* Various clean-upsKaoruToda2017-10-201-1/+1