summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
...
* Clean up and simplify the client verify code:jsing2019-03-311-50/+49
* Wrap long lines and apply some style(9).jsing2019-03-311-7/+10
* Use named field initialisers.jsing2019-03-312-16/+18
* Use correct capitalization of EC_GROUP_get_curve_GF{2m,p}(3).tb2019-03-291-4/+4
* Enable GOST cipher selection test after libssl has been fixed.bluhm2019-03-281-6/+1
* Cast nonce bytes to avoid undefined behaviour when left shifting.jsing2019-03-271-3/+3
* remove duplicate set key file call. from alf.tedu2019-03-271-3/+1
* bump to 2.9.1bcook2019-03-271-3/+3
* Use limits.h instead of sys/limits.h for portability.jsing2019-03-261-3/+2
* Update regress following sigalgs changes.jsing2019-03-251-17/+1
* Strip out all of the pkey to sigalg and sigalg to pkey linkages.jsing2019-03-255-59/+8
* tls1_process_sigalgs() is no longer needed.jsing2019-03-252-57/+2
* Defer sigalgs selection until the certificate is known.jsing2019-03-259-48/+124
* Rework ssl_ctx_use_certificate_chain_bio() to use the CERT_PKEY chain.jsing2019-03-251-46/+26
* Remove ssl_get_server_send_cert() which is now unused.jsing2019-03-252-14/+2
* Rework ssl3_output_cert_chain() to take a CERT_PKEY and consider chains.jsing2019-03-254-40/+36
* Add a chain member to CERT_PKEY and provide functions for manipulating it.jsing2019-03-252-3/+74
* In the incredibly unbelievable circumstance where _rs_init() fails toderaadt2019-03-241-2/+2
* If ssl_cipher_apply_rule() is given a specific cipher suite, match on it.jsing2019-03-241-3/+4
* Don't allow asn1_parse2 to recurse arbitrarily deep. Constrain to a maxbeck2019-03-241-1/+5
* Cast nonce bytes to avoid undefined behaviour when left shifting.jsing2019-03-241-3/+3
* do not call assert(), which has a tendency to leave traces of stuff inderaadt2019-03-241-2/+3
* Add range checks to varios ASN1_INTEGER functions to ensure thebeck2019-03-233-6/+62
* Fix typo in usage and comment.bluhm2019-03-213-6/+6
* import EVP_camellia_128_cbc(3) from OpenSSL 1.1.1,schwarze2019-03-214-3/+156
* space before punct;jmc2019-03-211-3/+3
* Split EVP_rc4(3) out of EVP_EncryptInit(3) to reduce clutter.schwarze2019-03-214-21/+116
* Split EVP_des_cbc(3) out of EVP_EncryptInit(3) to reduce clutter:schwarze2019-03-214-55/+230
* add a handful of missing functionsschwarze2019-03-211-5/+38
* Bring back EVP_chacha20 list item that was accidentally removedtb2019-03-211-2/+3
* fix examples (libtls uses its own error reporting mechanism)espie2019-03-201-4/+4
* escape backslashes;schwarze2019-03-202-11/+11
* Document the flag EVP_CIPHER_CTX_FLAG_WRAP_ALLOW needed for the EVPschwarze2019-03-192-4/+71
* Avoid an internal 2 byte overread in ssl_sigalgs().jsing2019-03-191-7/+2
* Revert TLS1_get{,_client}_version simplification because DTLS.jsing2019-03-194-14/+15
* * note that the handshake must be completed firstschwarze2019-03-181-4/+15
* Insert a missing input line break after a .Vt macro;schwarze2019-03-181-4/+5
* Split EVP_aes_128_cbc(3) out of EVP_EncryptInit(3):schwarze2019-03-184-74/+322
* In ssl.h rev. 1.165, tb@ provided version agnostic DTLS methods.schwarze2019-03-181-3/+26
* Document SM4; related to evp.h rev. 1.73.schwarze2019-03-184-6/+93
* Expand the ERR_PACK() macro to ERR_REASON() for consistency.tb2019-03-181-2/+2
* In evp.h rev. 1.75, tb@ provided EVP_PKEY_get0_hmac(3).schwarze2019-03-181-3/+29
* Add regress tests for the EVP_aes_*_wrap() API. Based on the tests intb2019-03-172-4/+19
* bump minors after symbol additiontb2019-03-173-3/+3
* Provide EVP_PKEY_get0_hmac(). From OpenSSL 1.1.1 which is stilltb2019-03-174-3/+23
* Provide EVP_aes_{128,192,256}_wrap(). This is a compatibletb2019-03-176-6/+174
* link sm4 regress to the buildtb2019-03-171-1/+2
* Add a regress test for the SM4 block cipher from the Chinese standardtb2019-03-172-0/+117
* Add the SM4 block cipher from the Chinese standard GB/T 32907-2016.tb2019-03-171-1/+8
* Add the SM4 block cipher from the Chinese standard GB/T 32907-2016.tb2019-03-178-3/+479