summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
...
* This test takes *days* to complete on older platforms, reduce the loop countmiod2025-10-261-2/+8
* Simplify tls13_server_hello_build()tb2025-10-251-5/+5
* Add missing Nm line for SSL_SESSION_duptb2025-10-241-2/+3
* Add some regress coverage for SSL_SESSION_dup()tb2025-10-241-2/+22
* The ssl_verify_param.c test can now link dynamically against libcryptotb2025-10-241-3/+1
* Use X509_VERIFY_PARAM_get_hostflags() prototype from x509_vfy.htb2025-10-241-3/+2
* bump lib{crypto,ssl,tls} minors after symbol additiontb2025-10-243-3/+3
* Document SSL_SESSION_dup(3)tb2025-10-241-3/+20
* Provide SSL_SESSION_dup()tb2025-10-244-3/+13
* Document X509_VERIFY_PARAM_set_hostflags(3)tb2025-10-241-2/+15
* Expose X509_VERIFY_PARAM_get_hostflags()tb2025-10-244-4/+7
* Implement ffsl() and ffsll() using the compiler builtin __builtin_ctzlclaudio2025-10-244-11/+66
* libssl: const correct the ssl_session_dup() helpertb2025-10-242-5/+5
* Prepare for gcc 3 leaving the building, COMPILER_VERSION can no longer getmiod2025-10-231-4/+4
* Revert r1.286 now that all supported platforms have __builtin_clz.miod2025-10-231-20/+1
* Give this test a chance to pass on 32-bit platforms.miod2025-10-201-1/+2
* Ensure that we specify the correct group when creating a HelloRetryRequest.jsing2025-10-162-9/+4
* use strtonum() instead of atoi(), and error out for bad numbersderaadt2025-10-111-2/+7
* const correct X509_VERIFY_PARAM_get_hostflags()tb2025-10-102-4/+4
* Remove unused sequence member from x509_revoked_sttb2025-10-102-11/+2
* Revert previous. Let's deal with it when the portable release is out.tb2025-10-071-7/+3
* test framework: allow overriding the "/tmp/" directorytb2025-10-071-3/+7
* cms: fix incorrect length check in kek_unwrap_key()tb2025-09-301-2/+2
* cms_RecipientInfo_pwri_crypt: fix incorrect return checktb2025-09-301-3/+3
* cms_RecipientInfo_pwri_crypt: plug leak of kekalgtb2025-09-301-3/+3
* libcrypto: rsa gen: min. distance between p and qjan2025-09-291-3/+19
* Bump libressl version to 4.2.0tb2025-09-281-3/+3
* Revert NULL,0 -> OPENSSL_FILE,OPENSSL_LINE from r1.78tb2025-09-281-9/+9
* ec_asn1_test: add an example using BLS12-377tb2025-09-171-1/+80
* wycheproof: provide PBKDF2 test harnesstb2025-09-161-2/+58
* mlkem_generate_key_external_entropy: normalize sizeof() usetb2025-09-161-2/+2
* Simplify MLKEM_{private,public}_key_new()tb2025-09-161-19/+7
* wycheproof: run HMACSM3 tests against libcryptotb2025-09-151-4/+7
* aes: move explicit_bzero() after NULL checktb2025-09-151-5/+7
* MLKEM_private_key_new: add missing space before =tb2025-09-151-2/+2
* wycheproof: run ML-KEM test vectors against libcryptotb2025-09-141-2/+139
* mlkem_public_to_private: fix overread/information leaktb2025-09-141-3/+3
* wycheproof: zap stray empty linetb2025-09-091-2/+1
* Call aes_set_encrypt_key_generic() from aes_set_decrypt_key_generic().jsing2025-09-081-2/+2
* Allow generic AES implementation to be used as a fallback.jsing2025-09-083-19/+65
* Zero the round keys on AES_set_{en,de}crypt_key() function entry.jsing2025-09-081-1/+5
* Validate AES_set_{encrypt,decrypt}_key() inputs at API boundary.jsing2025-09-082-18/+28
* wycheproof: rework test selectiontb2025-09-081-69/+82
* wycheproof: skip tests using curve448/edwards448tb2025-09-081-7/+12
* wycheproof: skip tests using SHAKE-128 and SHAKE-256tb2025-09-081-1/+17
* wycheproof: rename skipSmallCurve() into skipCurve()tb2025-09-081-4/+6
* wycheproof: determine the test variant from the JSON schematb2025-09-081-30/+41
* wycheproof: retire the ECDSA webcrypto teststb2025-09-071-71/+2
* Remove BN_DIV2W.jsing2025-09-073-28/+4
* Re-enable bn_sqr_words() assembly.jsing2025-09-073-8/+8