summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
* bn_prime.c: fix includesHEADmastertb2025-11-081-3/+4
* move the sentence about X509_VERIFY_PARAM_get_hostflags(3)schwarze2025-11-071-6/+7
* Use 64 bit BN_ULONG on 64 bit Windows platforms.jsing2025-11-071-2/+2
* tweak previous: "functions returns" -> "functions return"schwarze2025-11-061-4/+4
* Let this compile on m88k.miod2025-11-061-1/+3
* Use BN_ULONG in probable_prime_dh()tb2025-11-061-2/+2
* Use more specific types for BN.jsing2025-11-051-27/+29
* Avoid the use of _LP64 in libcrypto regress.jsing2025-11-051-2/+2
* In nref_nos() don't leak the ASN1_INTEGER if the push failstb2025-11-031-2/+4
* x509_cpols: pass correct free function to sk_ASN1_INTEGER_free()tb2025-11-031-2/+2
* x509_cpols: indent labels to make diffs more readabletb2025-11-031-8/+8
* Plug memeory leak in CMS_EncryptedData_encrypt()tb2025-11-031-2/+4
* ec_curve: Remove outdated creditstb2025-11-021-4/+1
* Needs <sys/param.h> for hppa.miod2025-10-311-3/+3
* des_key: add missing hyphen in semi-weak keystb2025-10-271-2/+2
* This test takes *days* to complete on older platforms, reduce the loop countmiod2025-10-261-2/+8
* Simplify tls13_server_hello_build()tb2025-10-251-5/+5
* Add missing Nm line for SSL_SESSION_duptb2025-10-241-2/+3
* Add some regress coverage for SSL_SESSION_dup()tb2025-10-241-2/+22
* The ssl_verify_param.c test can now link dynamically against libcryptotb2025-10-241-3/+1
* Use X509_VERIFY_PARAM_get_hostflags() prototype from x509_vfy.htb2025-10-241-3/+2
* bump lib{crypto,ssl,tls} minors after symbol additiontb2025-10-243-3/+3
* Document SSL_SESSION_dup(3)tb2025-10-241-3/+20
* Provide SSL_SESSION_dup()tb2025-10-244-3/+13
* Document X509_VERIFY_PARAM_set_hostflags(3)tb2025-10-241-2/+15
* Expose X509_VERIFY_PARAM_get_hostflags()tb2025-10-244-4/+7
* Implement ffsl() and ffsll() using the compiler builtin __builtin_ctzlclaudio2025-10-244-11/+66
* libssl: const correct the ssl_session_dup() helpertb2025-10-242-5/+5
* Prepare for gcc 3 leaving the building, COMPILER_VERSION can no longer getmiod2025-10-231-4/+4
* Revert r1.286 now that all supported platforms have __builtin_clz.miod2025-10-231-20/+1
* Give this test a chance to pass on 32-bit platforms.miod2025-10-201-1/+2
* Ensure that we specify the correct group when creating a HelloRetryRequest.jsing2025-10-162-9/+4
* use strtonum() instead of atoi(), and error out for bad numbersderaadt2025-10-111-2/+7
* const correct X509_VERIFY_PARAM_get_hostflags()tb2025-10-102-4/+4
* Remove unused sequence member from x509_revoked_sttb2025-10-102-11/+2
* Revert previous. Let's deal with it when the portable release is out.tb2025-10-071-7/+3
* test framework: allow overriding the "/tmp/" directorytb2025-10-071-3/+7
* cms: fix incorrect length check in kek_unwrap_key()tb2025-09-301-2/+2
* cms_RecipientInfo_pwri_crypt: fix incorrect return checktb2025-09-301-3/+3
* cms_RecipientInfo_pwri_crypt: plug leak of kekalgtb2025-09-301-3/+3
* libcrypto: rsa gen: min. distance between p and qjan2025-09-291-3/+19
* Bump libressl version to 4.2.0tb2025-09-281-3/+3
* Revert NULL,0 -> OPENSSL_FILE,OPENSSL_LINE from r1.78tb2025-09-281-9/+9
* ec_asn1_test: add an example using BLS12-377tb2025-09-171-1/+80
* wycheproof: provide PBKDF2 test harnesstb2025-09-161-2/+58
* mlkem_generate_key_external_entropy: normalize sizeof() usetb2025-09-161-2/+2
* Simplify MLKEM_{private,public}_key_new()tb2025-09-161-19/+7
* wycheproof: run HMACSM3 tests against libcryptotb2025-09-151-4/+7
* aes: move explicit_bzero() after NULL checktb2025-09-151-5/+7
* MLKEM_private_key_new: add missing space before =tb2025-09-151-2/+2