summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
* Pass SSL pointer to tls13_ctx_new().jsing2022-07-173-15/+11
* Revise regress for QUIC transport parameters TLS extension.jsing2022-07-171-15/+32
* Correct handling of QUIC transport parameters extension.jsing2022-07-171-48/+16
* Provide SSL_is_quic()jsing2022-07-173-5/+14
* Correct TLSEXT_TYPE_quic_transport_parameters message types.jsing2022-07-171-2/+2
* Correct value for TLSEXT_TYPE_quic_transport_parametersjsing2022-07-171-4/+6
* AESCGM -> AESGCMjsg2022-07-171-4/+4
* Add ESSCertIDv2 stack macroskn2022-07-161-1/+25
* Add ESSCertIDv2 ASN.1 boilerplatekn2022-07-162-2/+170
* Add NID for signingCertificateV2kn2022-07-162-0/+2
* Avoid direct X509 structure accesskn2022-07-162-12/+12
* Zap duplicate ERR_load_TS_strings() prototypekn2022-07-161-3/+1
* Revert previous. The added includes were already there. Duh.tb2022-07-161-4/+1
* Expand the comment explaining the for loop with bn_lucas_step() a bit.tb2022-07-151-3/+3
* Comment for factorization of n - 1 = k * 2^s in bn_miller_rabin_base_2()tb2022-07-151-1/+2
* Rename is_perfect_square to out_perfect in prototype to matchtb2022-07-151-2/+2
* Zap trailing whitespacetb2022-07-141-4/+4
* Suppress output of the deprecated -tls1 option in usage() and helptb2022-07-141-3/+2
* Switch to using TLS_client_method()tb2022-07-141-2/+2
* Only run the client connection test with supported ciphers. Avoids testtb2022-07-141-2/+2
* Document openssl ciphers -stb2022-07-141-3/+5
* Add -s option to openssl cipherstb2022-07-141-4/+20
* add .Xr links to SSL_CTX_set_security_level(3)schwarze2022-07-135-15/+20
* add a few .Xr links to new manual pagesschwarze2022-07-1311-24/+36
* In dsa.h rev. 1.34 (14 Jan 2022), tb@ provided DSA_bits(3).schwarze2022-07-131-10/+51
* In x509_vfy.h rev. 1.54, tb@ provided X509_VERIFY_PARAM_get_time(3)schwarze2022-07-131-3/+44
* link three new manual pages to the buildschwarze2022-07-131-1/+4
* Start documenting our new pet octopus, SSL_CTX_set_security_level(3).schwarze2022-07-132-1/+161
* Cast int64_t to uint64_t before negating.jsing2022-07-131-3/+7
* Write documentation for EVP_PKEY_check(3), EVP_PKEY_public_check(3),schwarze2022-07-135-44/+504
* Simplify computation of max_pub_key = dh->p - 1.tb2022-07-131-4/+2
* New manual page written from scratch;schwarze2022-07-131-0/+137
* Remove #ifndef around the definition of OPENSSL_TLS_SECURITY_LEVEL.tb2022-07-131-3/+1
* On May 4 14:19:08 2006 UTC, while fixing a security issue, djm@schwarze2022-07-131-11/+64
* Do not make tables static so we can access them from regress.tb2022-07-131-5/+5
* Enable Wycheproof primality tests.tb2022-07-132-4/+4
* Enable BPSW primality test.tb2022-07-131-1/+3
* Hook BPSW into BN_is_prime_fasttest_ex()tb2022-07-131-3/+13
* Link bn_bpsw.c to buildtb2022-07-131-2/+2
* Implement the Baillie-PSW primality testtb2022-07-132-1/+423
* Link bn_isqrt.c to buildtb2022-07-131-1/+2
* Integer square root and perfect square testtb2022-07-132-1/+241
* Unbreak the tree, after the previous commit.jsing2022-07-121-2/+1
* Move BN_lsw() to bn_lcl.h so that other code can use it.tb2022-07-122-5/+5
* Remove mkerr.pl remnants from LibreSSLkn2022-07-1263-1261/+61
* The asn1time test no longer needs static linking.tb2022-07-121-4/+1
* Sync cert.pem with certdata.txt from the NSS release branch. OK tb@ bcook@sthen2022-07-111-382/+849
* fix NULL return adding missing semicolonbcook2022-07-111-2/+2
* Annotate the security callback and the security ex_data as deliberatelytb2022-07-101-3/+3
* In dsa.h rev. 1.38, tb@ provided DSA_meth_get0_name(3)schwarze2022-07-101-8/+55