summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
...
* Document openssl ciphers -stb2022-07-141-3/+5
* Add -s option to openssl cipherstb2022-07-141-4/+20
* add .Xr links to SSL_CTX_set_security_level(3)schwarze2022-07-135-15/+20
* add a few .Xr links to new manual pagesschwarze2022-07-1311-24/+36
* In dsa.h rev. 1.34 (14 Jan 2022), tb@ provided DSA_bits(3).schwarze2022-07-131-10/+51
* In x509_vfy.h rev. 1.54, tb@ provided X509_VERIFY_PARAM_get_time(3)schwarze2022-07-131-3/+44
* link three new manual pages to the buildschwarze2022-07-131-1/+4
* Start documenting our new pet octopus, SSL_CTX_set_security_level(3).schwarze2022-07-132-1/+161
* Cast int64_t to uint64_t before negating.jsing2022-07-131-3/+7
* Write documentation for EVP_PKEY_check(3), EVP_PKEY_public_check(3),schwarze2022-07-135-44/+504
* Simplify computation of max_pub_key = dh->p - 1.tb2022-07-131-4/+2
* New manual page written from scratch;schwarze2022-07-131-0/+137
* Remove #ifndef around the definition of OPENSSL_TLS_SECURITY_LEVEL.tb2022-07-131-3/+1
* On May 4 14:19:08 2006 UTC, while fixing a security issue, djm@schwarze2022-07-131-11/+64
* Do not make tables static so we can access them from regress.tb2022-07-131-5/+5
* Enable Wycheproof primality tests.tb2022-07-132-4/+4
* Enable BPSW primality test.tb2022-07-131-1/+3
* Hook BPSW into BN_is_prime_fasttest_ex()tb2022-07-131-3/+13
* Link bn_bpsw.c to buildtb2022-07-131-2/+2
* Implement the Baillie-PSW primality testtb2022-07-132-1/+423
* Link bn_isqrt.c to buildtb2022-07-131-1/+2
* Integer square root and perfect square testtb2022-07-132-1/+241
* Unbreak the tree, after the previous commit.jsing2022-07-121-2/+1
* Move BN_lsw() to bn_lcl.h so that other code can use it.tb2022-07-122-5/+5
* Remove mkerr.pl remnants from LibreSSLkn2022-07-1263-1261/+61
* The asn1time test no longer needs static linking.tb2022-07-121-4/+1
* Sync cert.pem with certdata.txt from the NSS release branch. OK tb@ bcook@sthen2022-07-111-382/+849
* fix NULL return adding missing semicolonbcook2022-07-111-2/+2
* Annotate the security callback and the security ex_data as deliberatelytb2022-07-101-3/+3
* In dsa.h rev. 1.38, tb@ provided DSA_meth_get0_name(3)schwarze2022-07-101-8/+55
* Check that ASN1_{INTEGER,ENUMERATED}_get(NULL) return 0 as documented.tb2022-07-091-1/+22
* Make ASN1_{INTEGER,ENUMERATED}_get() return 0 on NULL againtb2022-07-092-2/+6
* Document ASN1_INTEGER_get_uint64(3), ASN1_INTEGER_get_int64(3),schwarze2022-07-091-6/+90
* whitespacetb2022-07-081-3/+3
* Add to variables instead of overriding themtb2022-07-081-4/+4
* Add support for primality checkingtb2022-07-074-10/+218
* sorttb2022-07-071-1/+1
* Sync bs_cbb.c with libssl.tb2022-07-071-1/+4
* Make CBB_finish() fail if *out_data is not NULLtb2022-07-071-1/+4
* Initialize hkdf_label to NULL.tb2022-07-071-2/+2
* Use a local bits variable to avoid ugly line break due to nested functiontb2022-07-071-6/+16
* Use the security level knob in the test script.tb2022-07-071-2/+14
* Only run tests against ciphers supported by the method.tb2022-07-072-4/+28
* Add some minimal regress coverage for the security level.tb2022-07-071-1/+6
* Make the ssltest security level aware.tb2022-07-071-1/+9
* Bump libtls minor after libcrypto and libssl minor bumptb2022-07-071-1/+1
* Unifdef LIBRESSL_HAS_SECURITY_LEVEL and remove some workaroundstb2022-07-073-35/+4
* Bump minor after symbol additiontb2022-07-071-1/+1
* Update Symbols.listtb2022-07-072-0/+25
* Expose security level symbols and error codes in the headers.tb2022-07-072-6/+2