summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
* Don't add an extra unknown error if we got a fatal alertbeck2020-01-221-2/+3
* The legacy_record_version must be set to TLS1_2_VERSION excepttb2020-01-224-9/+30
* Hook up the TLSv1.3 legacy shutdown code.jsing2020-01-221-2/+2
* Add minimal support for hello retry request for RFC conformance.beck2020-01-224-11/+71
* Split the TLSv1.3 guards into separate client and server guards.jsing2020-01-223-6/+13
* Implement close-notify and SSL_shutdown() handling for the TLSv1.3 client.jsing2020-01-223-9/+76
* Correct legacy fallback for TLSv1.3 client.jsing2020-01-213-9/+30
* Remove redundant ASN1_INTEGER_set call in PKCS7_set_typeinoguchi2020-01-211-2/+1
* Provide SSL_R_UNKNOWN.jsing2020-01-213-5/+7
* Clear and free the tls13_ctx that hangs off an SSL *s fromtb2020-01-212-2/+8
* Add alert processing in tls client code, by adding alert to thebeck2020-01-213-19/+30
* Add alerts to the tls 1.3 record layer and handshake layerbeck2020-01-202-49/+29
* Provide an error framework for use with the TLSv1.3 code.jsing2020-01-205-7/+151
* Update libtls config regress to include TLSv1.3.jsing2020-01-201-9/+16
* Add support for TLSv1.3 as a protocol to libtls.jsing2020-01-204-11/+20
* Free pss in RSA_freeinoguchi2020-01-171-1/+2
* Check fpu functions without setjmp/longjmp before testing the latter.bluhm2020-01-163-13/+71
* bump to 3.1.0bcook2020-01-141-3/+3
* Document how to make getopt_long(3) process arguments in order and stopstsp2020-01-131-2/+18
* Make clean should not require SUDO.bluhm2020-01-131-3/+1
* Fix printf compiler warnings in wfp regress. Convert wchar to abluhm2020-01-131-9/+18
* Link forgotten libc tests to the build.bluhm2020-01-132-6/+10
* Split setjmp-fpu regress into separate tests. Use errx(3) to explainbluhm2020-01-136-32/+69
* Avoid leak in error path of PKCS5_PBE_keyivgeninoguchi2020-01-121-1/+2
* Set "Content-Type: application/ocsp-request" in ocspcheck(1)'s POSTs,sthen2020-01-111-1/+2
* Avoid leak in error path of asn1_parse2inoguchi2020-01-091-17/+21
* If the client provides a TLS certificate and the user specifies abluhm2020-01-071-5/+6
* The unveil(2) for nc -U -u -l was wrong. The server cannot unveilbluhm2020-01-061-4/+23
* When using UNIX domain sockets, always call report_sock() with thebluhm2020-01-061-6/+10
* Check CMS API return value in openssl(1) cmsinoguchi2020-01-041-11/+21
* Avoid leak in error path of dh_priv_decodeinoguchi2020-01-041-1/+2
* In ssl.h rev. 1.167 and s3_lib.c rev. 1.188, jsing@ providedschwarze2020-01-021-4/+21
* Revise SSL_CTX_get_extra_chain_certs() to match OpenSSL behaviour.jsing2020-01-022-8/+23
* Provide TLSEXT_TYPE_* aliases for TLS 1.3.jsing2020-01-021-1/+10
* drand48(3) returns values in [0.0, 1.0).tb2019-12-201-3/+3
* spelling; from bryan stensonjmc2019-12-191-3/+3
* use "Currently" in the doc for "openssl enc" when talking about defaultsthen2019-12-181-2/+2
* In January, the default digest used in the openssl enc command wastb2019-12-181-7/+4
* whitespace from go fmt + update a commenttb2019-12-141-4/+4
* Run Wycheproof HMAC test vectors against libcrypto.tb2019-12-141-1/+96
* Fix documented signatures of HMAC(3) and HMAC_Update(3). The n and lentb2019-12-141-4/+4
* The file passed to realpath(3) must exists, adjust man page to newbluhm2019-12-111-3/+3
* update to-do listtb2019-12-091-2/+1
* Run Wycheproof DSA P1363 test vectors against libcrypto.tb2019-12-091-19/+71
* Document X509_STORE_CTX_set_flags() which is a handy way to change theclaudio2019-12-051-3/+18
* update to-do listtb2019-12-031-2/+2
* Run Wycheproof ECDSA P1363 test vectors against libcrypto.tb2019-12-031-8/+8
* Add an EcPoint variant and pass it to the ECDH test runner.tb2019-12-031-20/+31
* Annotate test vector files with an enum which we can then pass to thetb2019-12-031-27/+48
* Add missing RCS tag.tb2019-12-031-0/+1