summaryrefslogtreecommitdiff
path: root/src/lib (follow)
Commit message (Expand)AuthorAgeFilesLines
* Make SSL_CIPHER, SSL_CTX, SSL_SESSION, {DTLS1,SSL3}_STATEtb2021-05-103-8/+7
* Provide SSL_SESSION_get0_cipher(3)tb2021-05-103-2/+10
* Provide SSL_CTX_get_ssl_method(3)tb2021-05-103-2/+11
* Provide SSL_CIPHER_find(3)tb2021-05-103-2/+10
* Expose EVP_Digest{Sign,Verify}(3)tb2021-05-102-5/+3
* Expose EC_POINT_{get,set}_affine_coordinates(3) andtb2021-05-102-7/+11
* Expose EC_GROUP_{get,set}_curve(3)tb2021-05-102-3/+4
* Add draft-ietf-sidrops-rpki-rsc OIDjob2021-05-092-0/+2
* Prepare to provide EVP_Digest{Sign,Verify}tb2021-05-092-3/+35
* Replace DTLS w_epoch with epoch from TLSv1.2 record layer.jsing2021-05-055-29/+20
* Rewrite TLSv1.2 key block handling.jsing2021-05-055-134/+247
* Fix corner case for compressed points on binary curvestb2021-05-031-1/+5
* riscv64 openssl configdrahn2021-05-021-0/+154
* Prevent future internal use of some #definestb2021-05-021-1/+3
* Clean up tls1_change_cipher_state().jsing2021-05-025-42/+29
* In the TLSv1.2 server, set up the key block after sending the CCS.jsing2021-05-021-7/+7
* Clean up dtls1_reset_seq_numbers().jsing2021-05-025-26/+22
* Ensure that handshake hash is non-NULL in tls1_transcript_hash_value().jsing2021-05-021-1/+4
* Harden tls12_finished_verify_data() by checking master key length.jsing2021-05-021-1/+4
* Stop deriving peer finished twice for TLSv1.2.jsing2021-05-021-12/+1
* Make TS_compute_imprint a bit more robust.tb2021-05-021-20/+28
* Retire OpenBSD/sgi.visa2021-05-011-5/+1
* bump to LibreSSL 3.4.0 in -currentbcook2021-05-011-3/+3
* Plug leak in c2i_ASN1_OBJECTtb2021-05-011-3/+8
* Prevent double free in int_TS_RESP_verify_tokentb2021-05-011-1/+2
* Clean up and harden TLSv1.2 master key derivation.jsing2021-04-305-54/+51
* Revert "Handle X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE in newtb2021-04-281-4/+1
* Relax SAN DNSname validation and constraints to permit non leading *beck2021-04-271-19/+21
* Clean up derivation of finished/peer finished.jsing2021-04-258-116/+147
* Do not leave errors on the error stack on PKCS12_parse() success.tb2021-04-241-1/+3
* Enable the new verifier again so hopefully the remaining kinks get ironedtb2021-04-241-2/+2
* whitespacetb2021-04-231-3/+3
* Only hash known CH extensionstb2021-04-221-5/+5
* Clean up TLSv1.2 certificate request handshake data.jsing2021-04-215-43/+27
* Fix indent of EC_METHODs as requested by jsing.tb2021-04-206-192/+192
* Compare pointer against NULL and fix a KNF issue.tb2021-04-201-3/+3
* Prepare to provide EC_POINT_set_compressed_coordinatestb2021-04-205-57/+41
* Compare function pointers against NULL, not 0.tb2021-04-201-3/+3
* Provide EC_POINT_{g,s}et_Jprojective_coordinates for internal usetb2021-04-2010-77/+97
* Simplify code after adding EC_POINT_{s,g}et_affine_coordinates()tb2021-04-203-73/+18
* Compare function pointers against NULL, not 0.tb2021-04-201-3/+3
* Prepare to provide EC_POINT_{g,s}et_affine_coordinatestb2021-04-2018-92/+90
* Simplify after EC_POINT_get_curve() additiontb2021-04-202-30/+8
* Compare function pointers against NULL, not 0.tb2021-04-201-3/+3
* Prepare to provide EC_GROUP_{get,set}_curve(3)tb2021-04-206-41/+51
* Remove new_sym_enc and new_aead.jsing2021-04-193-10/+19
* Avoid division by zero in hybrid point encodingtb2021-04-191-17/+49
* Move new_mac_secret_size into the TLSv1.2 handshake struct.jsing2021-04-192-5/+7
* Move reuse_message, message_type, message_size and cert_verify into thejsing2021-04-196-59/+62
* Set alpn_selected_len to zero when freeing alpn_selected.jsing2021-04-191-1/+2