summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
...
* In the incredibly unbelievable circumstance where _rs_init() fails toderaadt2019-03-241-2/+2
* If ssl_cipher_apply_rule() is given a specific cipher suite, match on it.jsing2019-03-241-3/+4
* Don't allow asn1_parse2 to recurse arbitrarily deep. Constrain to a maxbeck2019-03-241-1/+5
* Cast nonce bytes to avoid undefined behaviour when left shifting.jsing2019-03-241-3/+3
* do not call assert(), which has a tendency to leave traces of stuff inderaadt2019-03-241-2/+3
* Add range checks to varios ASN1_INTEGER functions to ensure thebeck2019-03-233-6/+62
* Fix typo in usage and comment.bluhm2019-03-213-6/+6
* import EVP_camellia_128_cbc(3) from OpenSSL 1.1.1,schwarze2019-03-214-3/+156
* space before punct;jmc2019-03-211-3/+3
* Split EVP_rc4(3) out of EVP_EncryptInit(3) to reduce clutter.schwarze2019-03-214-21/+116
* Split EVP_des_cbc(3) out of EVP_EncryptInit(3) to reduce clutter:schwarze2019-03-214-55/+230
* add a handful of missing functionsschwarze2019-03-211-5/+38
* Bring back EVP_chacha20 list item that was accidentally removedtb2019-03-211-2/+3
* fix examples (libtls uses its own error reporting mechanism)espie2019-03-201-4/+4
* escape backslashes;schwarze2019-03-202-11/+11
* Document the flag EVP_CIPHER_CTX_FLAG_WRAP_ALLOW needed for the EVPschwarze2019-03-192-4/+71
* Avoid an internal 2 byte overread in ssl_sigalgs().jsing2019-03-191-7/+2
* Revert TLS1_get{,_client}_version simplification because DTLS.jsing2019-03-194-14/+15
* * note that the handshake must be completed firstschwarze2019-03-181-4/+15
* Insert a missing input line break after a .Vt macro;schwarze2019-03-181-4/+5
* Split EVP_aes_128_cbc(3) out of EVP_EncryptInit(3):schwarze2019-03-184-74/+322
* In ssl.h rev. 1.165, tb@ provided version agnostic DTLS methods.schwarze2019-03-181-3/+26
* Document SM4; related to evp.h rev. 1.73.schwarze2019-03-184-6/+93
* Expand the ERR_PACK() macro to ERR_REASON() for consistency.tb2019-03-181-2/+2
* In evp.h rev. 1.75, tb@ provided EVP_PKEY_get0_hmac(3).schwarze2019-03-181-3/+29
* Add regress tests for the EVP_aes_*_wrap() API. Based on the tests intb2019-03-172-4/+19
* bump minors after symbol additiontb2019-03-173-3/+3
* Provide EVP_PKEY_get0_hmac(). From OpenSSL 1.1.1 which is stilltb2019-03-174-3/+23
* Provide EVP_aes_{128,192,256}_wrap(). This is a compatibletb2019-03-176-6/+174
* link sm4 regress to the buildtb2019-03-171-1/+2
* Add a regress test for the SM4 block cipher from the Chinese standardtb2019-03-172-0/+117
* Add the SM4 block cipher from the Chinese standard GB/T 32907-2016.tb2019-03-171-1/+8
* Add the SM4 block cipher from the Chinese standard GB/T 32907-2016.tb2019-03-178-3/+479
* Provide version agnostic DTLS methods.jsing2019-03-173-2/+27
* Correct return value handling in tls13_handshake_recv_action().jsing2019-03-171-2/+4
* Partially clean up the TLS1_get_{,client}_version macros.jsing2019-03-174-15/+14
* Remove the alert level from the TLSv1.3 alert callback.jsing2019-03-173-7/+6
* Document the return values of X509_delete_ext(3) and X509_add_ext(3).schwarze2019-03-151-11/+15
* OpenSSL documents the macro OPENSSL_VERSION_TEXT since Sep 24, 2018;schwarze2019-03-151-4/+7
* Document OCSP_basic_verify(3).schwarze2019-03-151-5/+75
* Fix a number of ASN1_INTEGER vs ASN1_STRING mixups coming from thetb2019-03-135-13/+11
* add a comment to format-pem.pl documenting typical steps to updatesthen2019-03-131-1/+9
* Backport support for probing ARMv8 HW acceleration capabilities on armv7patrick2019-03-133-32/+121
* fix some cases of spaces before full stops, where none were neccessary;jmc2019-03-101-3/+3
* rename CRYPTO_set_locking_callback.3 to CRYPTO_lock.3schwarze2019-03-102-4/+4
* delete functions from the manual page that do nothing in LibreSSLschwarze2019-03-103-318/+87
* Typo in comment.tb2019-03-061-2/+2
* Don't index a void pointer, fixes compilation with visual studio.millert2019-03-041-2/+3
* Fix OID for sm3WithRSAEncryption which was apparently mixed uptb2019-03-021-1/+1
* Implement non-SSL_MODE_ENABLE_PARTIAL_WRITE in tls13_legacy_write_bytes().jsing2019-02-281-3/+34