summaryrefslogtreecommitdiff
path: root/include/openssl/sslerr.h
Commit message (Expand)AuthorAgeFilesLines
* Make error reason for disallowed legacy sigalg more specificTomas Mraz2022-12-131-0/+1
* Fix make updateMatt Caswell2022-10-201-1/+1
* Consolidate sequence counter incrementing codeMatt Caswell2022-10-201-0/+1
* Add support for compressed certificates (RFC8879)Todd Short2022-10-181-0/+1
* Make the record layer directly aware of EtMMatt Caswell2022-08-181-0/+1
* Implement KTLS in the new read record layer codeMatt Caswell2022-08-181-0/+1
* Convert ssl3_get_record to tls_read_recordMatt Caswell2022-08-181-0/+2
* Transfer the functionality from ssl3_read_n to the new record layerMatt Caswell2022-08-181-1/+3
* make updateBenjamin Kaduk2021-05-121-0/+1
* Remove all trace of FIPS_mode functionsRich Salz2021-05-061-1/+0
* Use OCSP-specific error code for clarityDmitry Belyavskiy2021-05-011-0/+1
* Remove OPENSSL_NO_EC guards from libsslMatt Caswell2021-02-051-0/+1
* Make supported_groups code independent of EC and DHMatt Caswell2021-02-051-0/+1
* ERR: Rebuild all generated error headers and source filesRichard Levitte2021-02-051-437/+0
* Update copyright yearRichard Levitte2021-01-281-1/+1
* Clean away extraneous library specific FETCH_FAILED reason codesRichard Levitte2021-01-121-2/+0
* ERR: Rebuild all generated error headers and source filesRichard Levitte2020-11-241-4/+1
* [ssl] Support ssl_encapsulate on server sideNicola Tuveri2020-10-141-0/+1
* [ssl] Support ssl_decapsulate on client sideNicola Tuveri2020-10-141-0/+1
* Improve some error messages if a digest is not availableMatt Caswell2020-08-291-0/+1
* Provider a better error message if we fail to copy parametersMatt Caswell2020-06-191-0/+1
* Constants for new GOST TLS 1.2 ciphersuitesDmitry Belyavskiy2020-05-191-1/+3
* mkerr: remove legacy guards from generated error headersDr. Matthias St. Pierre2020-04-151-5/+0
* Use a fetched version of SHA256 in tls_process_new_session_ticket()Matt Caswell2020-03-241-0/+1
* Code to thread-safety in ChangeCipherStateBenjamin Kaduk2020-03-131-0/+1
* Detect EOF while reading in libsslMatt Caswell2020-02-041-1/+2
* Update source files for deprecation at 3.0Richard Levitte2019-11-071-2/+2
* Add legacy include guards to public header filesDr. Matthias St. Pierre2019-09-281-0/+6
* Fix header file include guard namesDr. Matthias St. Pierre2019-09-281-2/+2
* Regenerate mkerr filesRich Salz2019-07-161-429/+431
* ssl: Add SSL_sendfileBoris Pismenny2019-05-071-0/+1
* Remove heartbeats completelyRichard Levitte2019-03-291-3/+0
* Add regenerated header filesRich Salz2019-03-111-0/+4
* Don't interleave handshake and other record types in TLSv1.3Matt Caswell2019-02-191-1/+2
* Following the license change, modify the boilerplates in include/ and crypto/...Richard Levitte2018-12-061-1/+1
* Fix some TLSv1.3 alert issuesMatt Caswell2018-07-311-0/+2
* Validate legacy_versionMatt Caswell2018-07-201-0/+1
* Return a fatal error if application data is encountered during shutdownMatt Caswell2018-06-271-0/+1
* Respect SSL_OP_NO_TICKET in TLSv1.3Matt Caswell2018-06-261-1/+3
* Restructure the ticket construction codeMatt Caswell2018-06-261-0/+1
* Fix last(?) batch of malloc-NULL placesRich Salz2018-04-261-0/+1
* Set error code on alloc failuresRich Salz2018-04-031-0/+12
* Fix an error number clashMatt Caswell2018-03-141-1/+1
* Split configuration of TLSv1.3 ciphers from older ciphersMatt Caswell2018-03-141-0/+1
* Add SSL/SSL_CTX_use_cert_and_key()Todd Short2018-03-091-0/+4
* Give more information in the SSL_stateless return codeMatt Caswell2018-03-091-0/+1
* Small simplification in mkerr.plFdaSilvaYY2018-02-091-4/+1
* Add TLSv1.3 post-handshake authentication (PHA)Todd Short2018-02-011-0/+12
* Add support for the TLS 1.3 signature_algorithms_cert extensionBenjamin Kaduk2018-01-251-1/+2
* Add support for sending TLSv1.3 cookiesMatt Caswell2018-01-241-0/+2