summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
* Ensure that we specify the correct group when creating a HelloRetryRequest.HEADmasterjsing4 days2-9/+4
* use strtonum() instead of atoi(), and error out for bad numbersderaadt8 days1-2/+7
* const correct X509_VERIFY_PARAM_get_hostflags()tb9 days2-4/+4
* Remove unused sequence member from x509_revoked_sttb10 days2-11/+2
* Revert previous. Let's deal with it when the portable release is out.tb12 days1-7/+3
* test framework: allow overriding the "/tmp/" directorytb12 days1-3/+7
* cms: fix incorrect length check in kek_unwrap_key()tb2025-09-301-2/+2
* cms_RecipientInfo_pwri_crypt: fix incorrect return checktb2025-09-301-3/+3
* cms_RecipientInfo_pwri_crypt: plug leak of kekalgtb2025-09-301-3/+3
* libcrypto: rsa gen: min. distance between p and qjan2025-09-291-3/+19
* Bump libressl version to 4.2.0tb2025-09-281-3/+3
* Revert NULL,0 -> OPENSSL_FILE,OPENSSL_LINE from r1.78tb2025-09-281-9/+9
* ec_asn1_test: add an example using BLS12-377tb2025-09-171-1/+80
* wycheproof: provide PBKDF2 test harnesstb2025-09-161-2/+58
* mlkem_generate_key_external_entropy: normalize sizeof() usetb2025-09-161-2/+2
* Simplify MLKEM_{private,public}_key_new()tb2025-09-161-19/+7
* wycheproof: run HMACSM3 tests against libcryptotb2025-09-151-4/+7
* aes: move explicit_bzero() after NULL checktb2025-09-151-5/+7
* MLKEM_private_key_new: add missing space before =tb2025-09-151-2/+2
* wycheproof: run ML-KEM test vectors against libcryptotb2025-09-141-2/+139
* mlkem_public_to_private: fix overread/information leaktb2025-09-141-3/+3
* wycheproof: zap stray empty linetb2025-09-091-2/+1
* Call aes_set_encrypt_key_generic() from aes_set_decrypt_key_generic().jsing2025-09-081-2/+2
* Allow generic AES implementation to be used as a fallback.jsing2025-09-083-19/+65
* Zero the round keys on AES_set_{en,de}crypt_key() function entry.jsing2025-09-081-1/+5
* Validate AES_set_{encrypt,decrypt}_key() inputs at API boundary.jsing2025-09-082-18/+28
* wycheproof: rework test selectiontb2025-09-081-69/+82
* wycheproof: skip tests using curve448/edwards448tb2025-09-081-7/+12
* wycheproof: skip tests using SHAKE-128 and SHAKE-256tb2025-09-081-1/+17
* wycheproof: rename skipSmallCurve() into skipCurve()tb2025-09-081-4/+6
* wycheproof: determine the test variant from the JSON schematb2025-09-081-30/+41
* wycheproof: retire the ECDSA webcrypto teststb2025-09-071-71/+2
* Remove BN_DIV2W.jsing2025-09-073-28/+4
* Re-enable bn_sqr_words() assembly.jsing2025-09-073-8/+8
* Rename old assembly bn_sqr_words() to bn_sqr_word_wise().jsing2025-09-076-30/+27
* wycheproof: go fmttb2025-09-061-4/+4
* wycheproof: use a cleaner way of dealing with P1363 signature lengthtb2025-09-061-4/+12
* Deduplicate the mlkem 768 and mlkem 1024 code.beck2025-09-056-1788/+527
* wycheproof: check for the v1 directory since v0 will go awaytb2025-09-051-2/+2
* wycheproof: port the MI primes check to v1tb2025-09-052-3/+24
* wycheproof: remove support for v0 test vectorstb2025-09-051-68/+38
* wycheproof: drop JOSE teststb2025-09-051-2/+1
* wycheproof: move AES key wrap tests to v1tb2025-09-051-4/+4
* wycheproof: add support for EcCurve teststb2025-09-051-1/+103
* wycheproof: add custom JSON unmarshaler big integerstb2025-09-051-9/+58
* wycheproof: make RSA tests worktb2025-09-051-43/+79
* wycheproof: move ECDSA tests to v1tb2025-09-051-14/+15
* wycheproof: move ECDH tests to v1 (skip PEM for now)tb2025-09-051-6/+5
* wycheproof: move AES to v1 and explicitly skip gmac testtb2025-09-051-3/+3
* wycheproof: go fmttb2025-09-041-6/+6