summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
* Only hash known CH extensionstb2021-04-221-5/+5
* Add a test that roundtrips a bunch of points on all builtin curvestb2021-04-212-6/+268
* Clean up TLSv1.2 certificate request handshake data.jsing2021-04-215-43/+27
* Fix const in previous. Pointed out by asoutb2021-04-211-5/+5
* Fix indent of EC_METHODs as requested by jsing.tb2021-04-206-192/+192
* Adjust ectest.c for set_compressed_coordinatestb2021-04-201-9/+9
* Compare pointer against NULL and fix a KNF issue.tb2021-04-201-3/+3
* Prepare to provide EC_POINT_set_compressed_coordinatestb2021-04-205-57/+41
* Adjust ectest.c for get_Jprojective coordinate changetb2021-04-201-2/+2
* Compare function pointers against NULL, not 0.tb2021-04-201-3/+3
* Provide EC_POINT_{g,s}et_Jprojective_coordinates for internal usetb2021-04-2010-77/+97
* Simplify code after adding EC_POINT_{s,g}et_affine_coordinates()tb2021-04-203-73/+18
* Adjust ecdhtest.c for affine_coordinates changetb2021-04-202-7/+7
* Adjust ectest.c for affine_coordinates changetb2021-04-201-17/+17
* Compare function pointers against NULL, not 0.tb2021-04-201-3/+3
* Prepare to provide EC_POINT_{g,s}et_affine_coordinatestb2021-04-2018-92/+90
* Simplify after EC_POINT_get_curve() additiontb2021-04-202-30/+8
* Adjust ectest.c for EC_GROUP_{g,s}et_curve changetb2021-04-202-15/+15
* Add prototypes for EC_GROUP_get_curve_{GF2m,GFp}().tb2021-04-201-1/+6
* Compare function pointers against NULL, not 0.tb2021-04-201-3/+3
* Prepare to provide EC_GROUP_{get,set}_curve(3)tb2021-04-206-41/+51
* Remove new_sym_enc and new_aead.jsing2021-04-193-10/+19
* Avoid division by zero in hybrid point encodingtb2021-04-191-17/+49
* Move new_mac_secret_size into the TLSv1.2 handshake struct.jsing2021-04-192-5/+7
* Move reuse_message, message_type, message_size and cert_verify into thejsing2021-04-196-59/+62
* Set alpn_selected_len to zero when freeing alpn_selected.jsing2021-04-191-1/+2
* The powerpc64 ELFv2 ABI explicitly states that exception enable bitskettenis2021-04-191-1/+9
* mention DTLS1_2_VERSIONtb2021-04-151-3/+4
* Mention DTLS1_2_VERSION here, tootb2021-04-151-6/+8
* Document SSL_OP_NO_DTLSv1{,_2}tb2021-04-151-2/+15
* Document DTLSv1_2_{,client_,server_}method(3)tb2021-04-151-4/+36
* Merge documentation for SSL_is_dtls() from OpenSSLtb2021-04-151-5/+21
* Switch back to the legacy verifier for the release.tb2021-04-151-2/+2
* revert previous. some of the keyupdate tests still fail occasionallytb2021-04-141-2/+11
* Enable test-tls13-keyupdate.pytb2021-04-141-9/+2
* move test-record-size-limit.py to unsupportedtb2021-04-141-4/+3
* enable test-record-layer-fragmentation.pytb2021-04-141-7/+2
* factor argument to catch an alert mismatch into a helper functiontb2021-04-141-7/+8
* enable test-tlsfuzzer-invalid-compression-methods.pytb2021-04-131-5/+10
* enable test-large-hello.py as a slow testtb2021-04-131-3/+2
* with new defaults, test-fuzzed-plaintext.py is no longer slowtb2021-04-131-3/+2
* move a few tests to the unsupported group and fix two commentstb2021-04-131-15/+15
* annotate test-ecdhe-rsa-key-exchange-with-bad-messages.py with expectedtb2021-04-131-2/+3
* Update a stale comment and fix a typo.tb2021-04-111-3/+3
* An extra internal consistency check and a missing stats adjustment. ok tb@otto2021-04-091-1/+4
* Cache implementation has changed, we do not hold on to an exact numberotto2021-04-091-3/+4
* Enable test-cve-2016-6309.pytb2021-04-081-3/+2
* Avoid clobbering the error code when sending an alerttb2021-04-071-2/+3
* Use ERR_print_error_fp() to avoid leaking a BIO in fatal()tb2021-04-071-2/+2
* Check function return value in openssl(1) x509.cinoguchi2021-04-071-24/+71