1. e0f48ae BUG/MINOR: ssl: can't load ocsp files by William Lallemand · Tue Oct 15 13:44:57 2019 +0200
  2. 786188f BUG/MINOR: ssl: fix error messages for OCSP loading by William Lallemand · Tue Oct 15 10:05:37 2019 +0200
  3. 4a66013 BUG/MINOR: ssl: fix OCSP build with BoringSSL by William Lallemand · Mon Oct 14 14:51:41 2019 +0200
  4. 104a7a6 BUILD: ssl: wrong #ifdef for SSL engines code by William Lallemand · Mon Oct 14 14:14:59 2019 +0200
  5. 963b2e7 BUG/MINOR: ssl: fix build without multi-cert bundles by William Lallemand · Mon Oct 14 11:38:36 2019 +0200
  6. e15029b BUG/MEDIUM: ssl: NULL dereference in ssl_sock_load_cert_sni() by William Lallemand · Mon Oct 14 10:46:58 2019 +0200
  7. 246c024 MINOR: ssl: load the ocsp in/from the ckch by William Lallemand · Fri Oct 11 08:59:13 2019 +0200
  8. a17f411 MINOR: ssl: load the sctl in/from the ckch by William Lallemand · Thu Oct 10 15:16:44 2019 +0200
  9. 150bfa8 MEDIUM: ssl/cli: 'set ssl cert' updates a certificate from the CLI by William Lallemand · Thu Sep 19 17:12:49 2019 +0200
  10. f11365b MINOR: ssl: ssl_sock_load_crt_file_into_ckch() is filling from a BIO by William Lallemand · Thu Sep 19 14:25:58 2019 +0200
  11. 614ca0d MEDIUM: ssl: ssl_sock_load_ckchs() alloc a ckch_inst by William Lallemand · Mon Oct 07 13:52:11 2019 +0200
  12. 0c6d12f MINOR: ssl: ssl_sock_load_multi_ckchs() can properly fail by William Lallemand · Fri Oct 04 18:38:51 2019 +0200
  13. d919937 MINOR: ssl: ssl_sock_load_ckchn() can properly fail by William Lallemand · Fri Oct 04 15:37:05 2019 +0200
  14. 1d29c74 MEDIUM: ssl: split ssl_sock_add_cert_sni() by William Lallemand · Fri Oct 04 00:53:29 2019 +0200
  15. 9117de9 MEDIUM: ssl: introduce the ckch instance structure by William Lallemand · Fri Oct 04 00:29:42 2019 +0200
  16. 28a8fce BUG/MINOR: ssl: abort on sni_keytypes allocation failure by William Lallemand · Fri Oct 04 17:36:55 2019 +0200
  17. 8ed5b96 BUG/MINOR: ssl: free the sni_keytype nodes by William Lallemand · Fri Oct 04 17:24:39 2019 +0200
  18. fe49bb3 BUG/MINOR: ssl: abort on sni allocation failure by William Lallemand · Thu Oct 03 23:46:33 2019 +0200
  19. 4b989f2 MINOR: ssl: initialize the sni_keytypes_map as EB_ROOT by William Lallemand · Fri Oct 04 18:36:55 2019 +0200
  20. f6adbe9 REORG: ssl: move structures to ssl_sock.h by William Lallemand · Wed Sep 11 16:33:52 2019 +0200
  21. e3af8fb REORG: ssl: rename ckch_node to ckch_store by William Lallemand · Tue Oct 08 11:36:53 2019 +0200
  22. eed4bf2 MINOR: ssl: crt-list do ckchn_lookup by William Lallemand · Thu Oct 10 11:38:13 2019 +0200
  23. 1633e39 BUILD: ssl: fix a warning when built with openssl < 1.0.2 by William Lallemand · Mon Sep 30 12:58:13 2019 +0200
  24. 8200414 BUG/MINOR: ssl: always check for ssl connection before getting its XPRT context by Christopher Faulet · Tue Sep 10 10:12:03 2019 +0200
  25. 5762a0d BUG/MAJOR: ssl: ssl_sock was not fully initialized. by Emeric Brun · Fri Sep 06 15:36:02 2019 +0200
  26. 9d00869 CLEANUP: cli: replace all occurrences of manual handling of return messages by Willy Tarreau · Fri Aug 09 11:21:01 2019 +0200
  27. c985801 MINOR: ssl: ssl_fc_has_early should work for BoringSSL by Emmanuel Hocdet · Wed Aug 07 14:44:49 2019 +0200
  28. f967c31 BUG/MINOR: ssl: fix 0-RTT for BoringSSL by Emmanuel Hocdet · Mon Aug 05 18:04:16 2019 +0200
  29. 6e5f2ce BUG/MEDIUM: ssl: open the right path for multi-cert bundle by William Lallemand · Thu Aug 01 14:43:20 2019 +0200
  30. 1503e05 BUG/MINOR: ssl: fix ressource leaks on error by Emmanuel Hocdet · Wed Jul 31 18:30:33 2019 +0200
  31. 6dee29d BUG/MEDIUM: ssl: don't free the ckch in multi-cert bundle by William Lallemand · Thu Aug 01 10:59:34 2019 +0200
  32. a8c7374 BUG/MEDIUM: ssl: does not try to free a DH in a ckch by William Lallemand · Wed Jul 31 18:31:34 2019 +0200
  33. c4ecddf BUG/BUILD: ssl: fix build with openssl < 1.0.2 by William Lallemand · Wed Jul 31 16:50:08 2019 +0200
  34. a7a0f99 MINOR: ssl: clean ret variable in ssl_sock_load_ckchn by Emmanuel Hocdet · Tue Jul 30 17:17:03 2019 +0200
  35. efa4b95 CLEANUP: ssl: ssl_sock_load_crt_file_into_ckch by Emmanuel Hocdet · Tue Dec 04 17:37:47 2018 +0100
  36. 54227d8 MINOR: ssl: do not look at DHparam with OPENSSL_NO_DH by Emmanuel Hocdet · Tue Jul 30 17:04:01 2019 +0200
  37. 03e09f3 MINOR: ssl: check private key consistency in loading by Emmanuel Hocdet · Tue Jul 30 14:21:25 2019 +0200
  38. 1c65fdd MINOR: ssl: add extra chain compatibility by Emmanuel Hocdet · Mon Dec 03 18:07:44 2018 +0100
  39. 9246f8b MINOR: ssl: use STACK_OF for chain certs by Emmanuel Hocdet · Fri Nov 30 16:00:21 2018 +0100
  40. fa89222 MEDIUM: ssl: load DH param in struct cert_key_and_chain by William Lallemand · Tue Jul 23 16:06:08 2019 +0200
  41. 6af0399 MEDIUM: ssl: lookup and store in a ckch_node tree by William Lallemand · Tue Jul 23 15:00:54 2019 +0200
  42. 36b8463 MEDIUM: ssl: split the loading of the certificates by William Lallemand · Thu Jul 18 19:28:17 2019 +0200
  43. a59191b MEDIUM: ssl: use cert_key_and_chain struct in ssl_sock_load_cert_file() by William Lallemand · Wed May 15 16:08:56 2019 +0200
  44. c940207 MINOR: ssl: merge ssl_sock_load_cert_file() and ssl_sock_load_cert_chain_file() by William Lallemand · Wed May 15 15:33:54 2019 +0200
  45. 085a151 MINOR: ssl-sock: use conn->dst instead of &conn->addr.to by Willy Tarreau · Wed Jul 17 14:47:35 2019 +0200
  46. f5bdb64 MINOR: ssl: switch to conn_get_dst() to retrieve the destination address by Willy Tarreau · Wed Jul 17 11:29:32 2019 +0200
  47. fc9cfe4 REORG: proto_htx: Move HTX analyzers & co to http_ana.{c,h} files by Christopher Faulet · Tue Jul 16 14:54:53 2019 +0200
  48. 4979916 BUG/MINOR: ssl: revert empty handshake detection in OpenSSL <= 1.0.2 by Lukas Tribus · Mon Jul 08 14:29:15 2019 +0200
  49. e488ea8 BUG/MEDIUM: ssl: Don't attempt to set alpn if we're not using SSL. by Olivier Houchard · Fri Jun 28 14:10:33 2019 +0200
  50. 0ff2865 BUG/MEDIUM: ssl: Don't do anything in ssl_subscribe if we have no ctx. by Olivier Houchard · Mon Jun 24 18:57:39 2019 +0200
  51. 965e84e BUG/MEDIUM: ssl: Make sure we initiate the handshake after using early data. by Olivier Houchard · Sat Jun 15 20:59:30 2019 +0200
  52. 3c39a7d CLEANUP: connection: rename the wait_event.task field to .tasklet by Willy Tarreau · Fri Jun 14 14:42:29 2019 +0200
  53. 9faebe3 MEDIUM: tools: improve time format error detection by Willy Tarreau · Fri Jun 07 19:00:37 2019 +0200
  54. 81284e6 BUG/MEDIUM: ssl: Don't forget to initialize ctx->send_recv and ctx->recv_wait. by Olivier Houchard · Thu Jun 06 13:21:23 2019 +0200
  55. 03abf2d MEDIUM: connections: Remove CONN_FL_SOCK* by Olivier Houchard · Tue May 28 10:12:02 2019 +0200
  56. 2e05548 MINOR: connections: Add a new xprt method, add_xprt(). by Olivier Houchard · Mon May 27 19:50:12 2019 +0200
  57. 5149b59 MINOR: connections: Add a new xprt method, remove_xprt. by Olivier Houchard · Thu May 23 17:47:36 2019 +0200
  58. 000694c MINOR: ssl: Make ssl_sock_handshake() static. by Olivier Houchard · Thu May 23 14:45:12 2019 +0200
  59. ea8dd94 MEDIUM: ssl: Handle subscribe by itself. by Olivier Houchard · Mon May 20 14:02:16 2019 +0200
  60. 6567466 MINOR: SSL: add client/server random sample fetches by Patrick Hemmer · Tue Jun 04 08:13:03 2019 -0400
  61. 839af57 CLEANUP: ssl: remove unneeded defined(OPENSSL_IS_BORINGSSL) by Emmanuel Hocdet · Tue May 14 16:27:35 2019 +0200
  62. 692c1d0 MINOR: ssl: Don't forget to call the close method of the underlying xprt. by Olivier Houchard · Thu May 23 18:41:47 2019 +0200
  63. 19afb27 MINOR: ssl: Make sure the underlying xprt's init method doesn't fail. by Olivier Houchard · Thu May 23 18:24:07 2019 +0200
  64. 0590f44 BUILD: ssl: fix latest LibreSSL reg-test error by Ilya Shipitsin · Sat May 25 19:30:50 2019 +0500
  65. e242f3d BUG/MINOR: ssl_sock: Fix memory leak when disabling compression by Ilya Shipitsin · Sat May 25 03:38:14 2019 +0500
  66. 7e1770b BUG/MAJOR: ssl: segfault upon an heartbeat request by William Lallemand · Mon May 13 14:31:34 2019 +0200
  67. 295d614 CLEANUP: ssl: move all BIO_* definitions to openssl-compat by Willy Tarreau · Sat May 11 17:34:03 2019 +0200
  68. 11b1671 CLEANUP: ssl: remove ifdef around SSL_CTX_get_extra_chain_certs() by Willy Tarreau · Sat May 11 17:02:04 2019 +0200
  69. 366a698 CLEANUP: ssl: move the SSL_OP_* and SSL_MODE_* definitions to openssl-compat by Willy Tarreau · Sat May 11 17:09:44 2019 +0200
  70. 8d164dc CLEANUP: ssl: never include openssl/*.h outside of openssl-compat.h anymore by Willy Tarreau · Fri May 10 09:35:00 2019 +0200
  71. 9356dac REORG: ssl: move some OpenSSL defines from ssl_sock to openssl-compat by Willy Tarreau · Fri May 10 09:22:53 2019 +0200
  72. 5599456 REORG: ssl: move openssl-compat from proto to common by Willy Tarreau · Thu May 09 14:52:44 2019 +0200
  73. df17e0e BUILD: ssl: fix libressl build again after aes-gcm-enc by Willy Tarreau · Fri May 10 09:16:53 2019 +0200
  74. 86a394e MINOR: ssl: enable aes_gcm_dec on LibreSSL by Willy Tarreau · Thu May 09 14:15:32 2019 +0200
  75. 5db847a CLEANUP: ssl: remove 57 occurrences of useless tests on LIBRESSL_VERSION_NUMBER by Willy Tarreau · Thu May 09 14:13:35 2019 +0200
  76. 1d158ab BUILD: ssl: make libressl use its own version numbers by Willy Tarreau · Thu May 09 13:41:45 2019 +0200
  77. 9a1ab08 CLEANUP: ssl-sock: use HA_OPENSSL_VERSION_NUMBER instead of OPENSSL_VERSION_NUMBER by Willy Tarreau · Thu May 09 13:26:41 2019 +0200
  78. 4cd2af4 BUG/MEDIUM: ssl: Don't attempt to use early data with libressl. by Olivier Houchard · Mon May 06 15:18:27 2019 +0200
  79. 54832b9 BUILD: enable several LibreSSL hacks, including by Ilya Shipitsin · Sun May 05 23:27:54 2019 +0500
  80. 010941f BUG/MEDIUM: ssl: Use the early_data API the right way. by Olivier Houchard · Fri May 03 20:56:19 2019 +0200
  81. b51937e BUG/MEDIUM: ssl: Don't pretend we can retry a recv/send if we got a shutr/w. by Olivier Houchard · Wed May 01 17:24:36 2019 +0200
  82. a28454e BUG/MEDIUM: ssl: Return -1 on recv/send if we got EAGAIN. by Olivier Houchard · Wed Apr 24 12:04:36 2019 +0200
  83. d0e095c MINOR: ssl/cli: async fd io-handlers printable on show fd by Emeric Brun · Fri Apr 19 17:15:28 2019 +0200
  84. 66a7b33 BUILD/medium: ssl: Fix build with OpenSSL < 1.1.0 by Olivier Houchard · Thu Apr 18 15:58:15 2019 +0200
  85. a8955d5 MEDIUM: ssl: provide our own BIO. by Olivier Houchard · Sun Apr 07 22:00:38 2019 +0200
  86. e179d0e MEDIUM: connections: Provide a xprt_ctx for each xprt method. by Olivier Houchard · Thu Mar 21 18:27:17 2019 +0100
  87. df35784 MEDIUM: ssl: provide its own subscribe/unsubscribe function. by Olivier Houchard · Thu Mar 21 16:30:07 2019 +0100
  88. 7b5fd1e MEDIUM: connections: Move some fields from struct connection to ssl_sock_ctx. by Olivier Houchard · Thu Feb 28 18:10:45 2019 +0100
  89. 66ab498 MEDIUM: ssl: Give ssl_sock its own context. by Olivier Houchard · Tue Feb 26 18:37:15 2019 +0100
  90. 0e492e2 BUILD: address a few cases of "static <type> inline foo()" by Willy Tarreau · Mon Apr 15 21:25:03 2019 +0200
  91. 2b4edfb MINOR: ssl: Activate aes_gcm_dec converter for BoringSSL by Emmanuel Hocdet · Mon Apr 01 18:24:38 2019 +0200
  92. c31499d MINOR: ssl: Add aes_gcm_dec converter by Nenad Merdanovic · Sat Mar 23 11:00:32 2019 +0100
  93. bc34cd1 BUG/MEDIUM: ssl: ability to set TLS 1.3 ciphers using ssl-default-server-ciphersuites by Pierre Cheynier · Thu Mar 21 16:15:47 2019 +0000
  94. 2be5a4c MEDIUM: ssl: Use the new _HA_ATOMIC_* macros. by Olivier Houchard · Fri Mar 08 18:54:43 2019 +0100
  95. 1aabc93 BUG/MINOR: ssl: fix warning about ssl-min/max-ver support by Lukas Tribus · Tue Mar 05 23:14:32 2019 +0100
  96. 526894f BUG/MEDIUM: ssl: Fix handling of TLS 1.3 KeyUpdate messages by Dirkjan Bussink · Mon Jan 21 09:35:03 2019 -0800
  97. f24502b BUG/MEDIUM: connections: Add the CO_FL_CONNECTED flag if a send succeeded. by Olivier Houchard · Thu Jan 17 19:09:11 2019 +0100
  98. 9e75477 MINOR: ssl: add support of aes256 bits ticket keys on file and cli. by Emeric Brun · Thu Jan 10 17:51:55 2019 +0100
  99. 09852f7 BUG/MEDIUM: ssl: missing allocation failure checks loading tls key file by Emeric Brun · Thu Jan 10 10:51:13 2019 +0100
  100. 51088ce BUG/MEDIUM: ssl: Disable anti-replay protection and set max data with 0RTT. by Olivier Houchard · Wed Jan 02 18:46:41 2019 +0100