aboutsummaryrefslogtreecommitdiffstats
path: root/socket.c
Commit message (Expand)AuthorAgeFilesLines
* wolfSSL: add run-time check of wolfSSL_lib_version_hex()Matthias Andree2022-11-011-0/+6
* TLS: bump library version requirementsMatthias Andree2022-11-011-6/+6
* Tighten SSL library version requirements, more warnings.Matthias Andree2022-04-231-8/+12
* Bump wolfSSL requirement to 5.1.1 and get ready for fetchmail 6.4.27.Matthias Andree2022-01-261-2/+2
* wolfSSL: work around SSL_peek() error on handshakeMatthias Andree2021-12-261-1/+9
* Realign comments and variable names.Matthias Andree2021-12-051-4/+4
* Permit LibreSSL on OpenBSD.Matthias Andree2021-12-051-2/+6
* socket.c: SSL_peek/SSL_read consistency fixes.Matthias Andree2021-11-281-19/+16
* socket.c: SSL_CTX_set_mode(SSL_MODE_AUTO_RETRY)Matthias Andree2021-11-281-1/+3
* Revert "wolfSSL: workaround 5.0.0 SSL_peek() not truly blocking."Matthias Andree2021-11-281-2/+1
* wolfSSL: support WOLFSSL_TRUST_FILE as default trust storeMatthias Andree2021-11-211-4/+30
* wolfSSL: workaround 5.0.0 SSL_peek() not truly blocking.Matthias Andree2021-11-211-1/+2
* wolfSSL: support 5.0.0+.Matthias Andree2021-11-211-13/+43
* Fix X509_V_FLAG_TRUSTED_FIRST OpenSSL 1.0.2 workaroundMatthias Andree2021-11-201-5/+6
* OpenSSL: bump minimum required version to 1.0.2fMatthias Andree2021-11-201-3/+3
* LibreSSL: block, due to licensing issue.Matthias Andree2021-11-201-2/+2
* TLS: OpenSSL 1.0.2 workaround Let's Encrypt ExpiryMatthias Andree2021-11-011-1/+15
* socket.c: invalid sslproto no longer abort()sMatthias Andree2021-08-281-2/+0
* socket.c: plugin/plugout SIGSEGV and memleak fixesMatthias Andree2021-08-261-12/+26
* socket.c: SSL_use_PrivateKey_file <- SSL_use_RSAPrivateKey_file,Matthias Andree2021-03-131-1/+1
* OpenSSL: permit deprecated features,Matthias Andree2021-03-131-1/+5
* socket.c clean up code duplication.Matthias Andree2021-02-271-2/+2
* --version: print OpenSSL versions build/run-time and directoriesMatthias Andree2021-01-301-8/+5
* socket.c: Update copyright according to code changes.Matthias Andree2021-01-031-1/+1
* "Require" OpenSSL 1.1.1 and tolerate/warn 1.0.2.Matthias Andree2020-03-301-0/+4
* socket.c: add reference to README.SSL in error messageMatthias Andree2020-03-301-1/+2
* Fix garbage at end of plugin string with %h and/or %pMatthias Andree2020-03-291-2/+3
* Rename s -> vecsiz (vector size) to hint to its purposeMatthias Andree2020-03-291-4/+4
* socket.c: Make SockKeepalive static, and readability variable renames.Matthias Andree2019-09-271-9/+9
* Align with legacy_6x.Matthias Andree2019-08-251-4/+10
* fetchmail no longer reports System error during SSL_connect(): Success.Matthias Andree2019-08-051-3/+6
* Bump copyrights, and bump version to beta6.Matthias Andree2019-08-051-1/+4
* FreeBSD cleanups to header shuffling.Matthias Andree2019-08-051-4/+1
* Replace most strncpy() by strlcpy() calls.Matthias Andree2019-05-121-1/+1
* Enable OpenSSL >= 1.0.2 native name verification.Matthias Andree2019-01-271-0/+22
* Make compatible with a pure OpenSSL 1.1.0 API, ...Matthias Andree2018-06-061-1/+8
* Add a FIXME comment.Matthias Andree2017-08-111-0/+2
* Do not overrun plugin string when copying it.Alexander Bluhm2017-08-101-1/+1
* Cast argument to quiet -Wformat warning in C89 mode.Matthias Andree2017-04-231-1/+1
* Reformat.Matthias Andree2017-02-111-2/+2
* TLS: set hostname for SNI.Matthias Andree2017-02-111-0/+14
* Initial TLSv1.3 support code.Matthias Andree2017-02-111-1/+27
* Fixup protocol version handling in OpenSSL 1.0.X.Matthias Andree2016-12-121-0/+4
* Support for Debian/Ubuntu mutilated SSLv3 support.Matthias Andree2016-12-121-0/+4
* OpenSSL 1.1.0 API support.Matthias Andree2016-12-121-4/+76
* Refactor OpenSSL protocol version selection logic.Matthias Andree2016-12-121-44/+54
* Bump OpenSSL requirement to v1.0.2.Matthias Andree2016-12-111-2/+2
* Really try to continue if OpenSSL lib newer than headers used at compile-time.Matthias Andree2016-04-241-1/+0
* Enable TLS 1.1/1.2 options on LibreSSL.Matthias Andree2016-04-241-2/+2
* Avoid another C99-style comment.Matthias Andree2016-01-301-3/+2