index
:
delta/openssl-new.git
1.0.2-aead
BRANCH_ASN1
BRANCH_OpenSSL_0_9_8k
BRANCH_VMS_64BIT
BRANCH_WIN64
BRANCH_engine
OpenSSL-engine-0_9_6-stable
OpenSSL-fips-0_9_7-stable
OpenSSL-fips-0_9_8-stable
OpenSSL-fips-1_2-stable
OpenSSL-fips-2_0-dev
OpenSSL-fips-2_0-stable
OpenSSL-fips2-0_9_7-stable
OpenSSL-rfc3820-0_9_7-stable
OpenSSL_0_9_6-stable
OpenSSL_0_9_7-stable
OpenSSL_0_9_8-stable
OpenSSL_0_9_8fg-stable
OpenSSL_1_0_0-stable
OpenSSL_1_0_1-stable
OpenSSL_1_0_2-stable
OpenSSL_1_1_0-stable
OpenSSL_1_1_1-stable
OpenTLS
SSLeay
baserock/OpenSSL_1_0_1g
baserock/OpenSSL_1_0_2-stable
baserock/larswirzenius/morph
baserock/morph
baserock/pedroalvarez/power-port
baserock/ps/proto-web-system
eliminate-ssl-ctrl
master
openssl-3.0
openssl-3.1
rsalz-monolith
rt4526
supplemental-data-api-2
tls1.3-draft-18
tls1.3-draft-19
github.com: openssl/openssl.git
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
ssl
/
ssl_cert.c
Commit message (
Expand
)
Author
Age
Files
Lines
*
SSL object refactoring using SSL_CONNECTION object
Tomas Mraz
2022-07-28
1
-33
/
+73
*
tls: ban SSL3, TLS1, TLS1.1 and DTLS1.0 at security level one and above
Pauli
2022-05-08
1
-10
/
+4
*
Update copyright year
Matt Caswell
2022-05-03
1
-1
/
+1
*
Add SSL_(CTX_)?get0_(verify|chain)_cert_store functions
Hugo Landau
2022-04-06
1
-0
/
+6
*
[ssl] Add SSL_kDHEPSK and SSL_kECDHEPSK as PFS ciphersuites for SECLEVEL >= 3
Nicola Tuveri
2022-03-01
1
-2
/
+3
*
[ssl] Prefer SSL_k(EC)?DHE to the SSL_kE(EC)?DH alias
Nicola Tuveri
2022-03-01
1
-1
/
+1
*
add OSSL_STACK_OF_X509_free() for commonly used pattern
Dr. David von Oheimb
2021-12-21
1
-6
/
+6
*
Fix invalid handling of verify errors in libssl
Matt Caswell
2021-12-14
1
-2
/
+13
*
BIO_read_filename: fix return check
Peiwei Hu
2021-11-16
1
-2
/
+2
*
Change TLS RC4 cipher strength check to be data driven.
slontis
2021-09-23
1
-3
/
+0
*
cross-reference the DH and RSA SECLEVEL to level of security mappings
Hubert Kario
2021-06-23
1
-0
/
+5
*
ssl: do not choose auto DH groups that are weaker than the security level
Pauli
2021-06-19
1
-9
/
+24
*
Fix NULL access in ssl_build_cert_chain() when ctx is NULL.
Shane Lontis
2021-03-03
1
-1
/
+1
*
Remove OPENSSL_NO_DH guards from libssl
Matt Caswell
2021-02-05
1
-2
/
+1
*
Update copyright year
Richard Levitte
2021-01-28
1
-1
/
+1
*
Add X509_NAME_hash_ex() to be able to check if it failed due to unsupported SHA1
Dr. David von Oheimb
2021-01-13
1
-1
/
+2
*
Only disabled what we need to in a no-dh build
Matt Caswell
2020-11-18
1
-4
/
+3
*
SSL: refactor all SSLfatal() calls
Richard Levitte
2020-11-11
1
-3
/
+2
*
Convert all {NAME}err() in ssl/ to their corresponding ERR_raise() call
Richard Levitte
2020-11-11
1
-27
/
+25
*
Rename OPENSSL_CTX prefix to OSSL_LIB_CTX
Dr. Matthias St. Pierre
2020-10-15
1
-4
/
+4
*
Run the withlibctx.pl script
Matt Caswell
2020-10-01
1
-7
/
+7
*
Fix safestack issues in x509.h
Matt Caswell
2020-09-13
1
-3
/
+0
*
Add X509 related libctx changes.
Shane Lontis
2020-07-24
1
-13
/
+22
*
SSL: refactor ssl_cert_lookup_by_pkey() to work with provider side keys
Richard Levitte
2020-05-15
1
-10
/
+11
*
coverity 1462581 Dereference after null check
Pauli
2020-04-30
1
-1
/
+4
*
In OpenSSL builds, declare STACK for datatypes ...
Rich Salz
2020-04-24
1
-0
/
+3
*
Update copyright year
Matt Caswell
2020-04-23
1
-1
/
+1
*
Use X509_STORE_CTX_new_with_libctx() in libssl
Matt Caswell
2020-04-08
1
-2
/
+2
*
Explicitly cache X509v3 extensions in libssl
Matt Caswell
2020-03-30
1
-2
/
+11
*
SSL: Document SSL_add_{file,dir,store}_cert_subjects_to_stack()
Richard Levitte
2019-11-12
1
-39
/
+3
*
X509_LOOKUP_store: new X509_LOOKUP_METHOD that works by OSSL_STORE URI
Richard Levitte
2019-11-03
1
-0
/
+74
*
Reorganize local header files
Dr. Matthias St. Pierre
2019-09-28
1
-1
/
+1
*
Replace FUNCerr with ERR_raise_data
Rich Salz
2019-08-02
1
-2
/
+3
*
Deprecate SYSerr, add new FUNCerr macro
Rich Salz
2019-07-22
1
-1
/
+1
*
Add ERR_put_func_error, and use it.
Rich Salz
2019-07-22
1
-1
/
+1
*
Move 'shared_sigalgs' from cert_st to ssl_st
Benjamin Kaduk
2019-06-26
1
-3
/
+0
*
Collapse ssl3_state_st (s3) into ssl_st
Todd Short
2019-04-29
1
-2
/
+2
*
Following the license change, modify the boilerplates in ssl/
Richard Levitte
2018-12-06
1
-1
/
+1
*
Separate ca_names handling for client and server
Matt Caswell
2018-11-12
1
-6
/
+7
*
Unbreak SECLEVEL 3 regression causing it to not accept any ciphers.
Tomas Mraz
2018-11-10
1
-2
/
+2
*
Rename SSL[_CTX]_add1_CA_list -> SSL[_CTX]_add1_to_CA_list
Richard Levitte
2018-09-03
1
-2
/
+6
*
Allow TLS-1.3 ciphersuites in @SECLEVEL=3 and above
Tomas Mraz
2018-08-22
1
-1
/
+2
*
Check that the public key OID matches the sig alg
Matt Caswell
2018-07-18
1
-9
/
+22
*
Allow NULL for some _free routines.
Rich Salz
2018-03-27
1
-0
/
+2
*
Remove some code for a contributor that we cannot find
Matt Caswell
2018-03-27
1
-3
/
+0
*
Update copyright years on all files merged since Jan 1st 2018
Richard Levitte
2018-01-09
1
-1
/
+1
*
Avoid only exact duplicates when creating the accepted CA names list
Tomas Mraz
2018-01-08
1
-4
/
+23
*
Consistent formatting for sizeof(foo)
Rich Salz
2017-12-07
1
-3
/
+3
*
Simplify the stack reservation
Paul Yang
2017-10-26
1
-5
/
+1
*
Various clean-ups
KaoruToda
2017-10-20
1
-1
/
+1
[next]