summaryrefslogtreecommitdiff
path: root/src/lib (follow)
Commit message (Expand)AuthorAgeFilesLines
* Add consts to EVP_PKEY_asn1_set_private()tb2018-08-248-16/+16
* After removing support for broken PKCS#8 formats (it was high time),tb2018-08-247-22/+19
* Remove EVP_PKEY2PKCS8_broken() and PKCS8_set_broken()tb2018-08-245-98/+46
* Document const change for OCSP_cert_to_id()tb2018-08-241-4/+4
* Add const to two arguments of OCSP_cert_to_id()tb2018-08-242-6/+7
* Provide X509_get0_serialNumber()tb2018-08-243-2/+10
* Turn a number of #defines into proper functions with prototypes matchingtb2018-08-245-18/+80
* Change PEM_Sign{Init,Update}() to return an int.tb2018-08-242-8/+8
* Check return value of EVP_EncodeUpdate() in PEM_write_bio().tb2018-08-241-2/+3
* Check return value of EVP_EncodeUpdate() in b64_write().tb2018-08-241-3/+4
* Convert EVP_EncodeUpdate() to return an int to allow for errortb2018-08-242-8/+10
* Provide EVP_CIPHER_CTX_encrypting().tb2018-08-243-2/+10
* unifdef DTLS1_AD_MISSING_HANDSHAKE_MESSAGE.jsing2018-08-242-26/+3
* Document prototype change and return values for BIO_set_cipher()tb2018-08-241-3/+5
* Return an int in BIO_set_cipher() to be able to report errors.tb2018-08-242-13/+22
* In DSO_up_ref(), check return value of CRYPTO_add() and reporttb2018-08-241-3/+5
* In ENGINE_up_ref(), check return value of CRYPTO_add() and reporttb2018-08-241-3/+5
* Document new prototype and return values of X509_OBJECT_up_ref_count()tb2018-08-241-3/+6
* Make X509_OBJECT_up_ref_count return an int.tb2018-08-242-9/+7
* Update documentation of CRYPTO_mem_leaks*.tb2018-08-241-6/+12
* Let CRYPTO_mem_leaks{,_fp,_cb}() return -1.tb2018-08-242-12/+12
* Simplify session ticket parsing/handling.jsing2018-08-244-69/+46
* Pull up the parsing of a ClientHello.jsing2018-08-241-20/+20
* Clean up handshake message start/finish functions.jsing2018-08-246-76/+38
* Correct session ticket encryption.jsing2018-08-221-4/+11
* typo in argument type, from Mario dot Andres dot Campos at gmail dot comschwarze2018-08-211-3/+3
* Don't leak sktmp in X509_verify_cert().tb2018-08-191-5/+5
* whitespace fixtb2018-08-191-2/+2
* Don't leak db on error in RSA_padding_check_PKCS1_OAEP().tb2018-08-191-7/+7
* Rename and collapse tls12_get_sigandhash_cbb().jsing2018-08-194-39/+28
* Convert ssl3_send_newsession_ticket() to CBB.jsing2018-08-191-55/+64
* Convert ssl3_send_client_verify() to CBB.jsing2018-08-171-43/+50
* Provide CBB_add_u32(), as needed for an upcoming conversion.jsing2018-08-162-2/+17
* Simplify the add signature code/logic in ssl3_send_server_key_exchange().jsing2018-08-161-13/+8
* Convert ssl3_send_server_key_exchange() to CBB.jsing2018-08-163-47/+71
* Convert ssl3_get_server_key_exchange() to CBS.jsing2018-08-161-69/+55
* Add a comment that explains what the check is doing and why len >= 1.tb2018-08-141-1/+2
* The UI_add_{input,verify}_string() functions want a length not includingtb2018-08-141-5/+8
* Remove now unused variable, that got left behind from a previous change.jsing2018-08-141-3/+1
* Actually check the return values for EVP_Sign* and EVP_Verify*.jsing2018-08-142-15/+23
* Simplify server key exchange signature verification.jsing2018-08-101-49/+18
* Simplify server kex exchange signature generation.jsing2018-08-101-61/+33
* Add glue to EVP_md5_sha1() so that it can be used with EVP_Sign* andjsing2018-08-101-1/+12
* Add missing include to X25519 synopsis.jsing2018-08-101-2/+3
* typo: macro-generates wrappers -> macro-generated wrapperstb2018-08-081-3/+3
* Remove unnecessary NULL check from get_cert_by_subject sincelibressl-v2.8.0bcook2018-08-051-3/+3
* Fix a memory leak in i2d_RSA_NET on failure of ASN1_STRING_set.bcook2018-08-051-2/+2
* In RSA_padding_add_PKCS1_OAEP, dbmask needs to be freed on failure.bcook2018-08-051-3/+7
* Fix memory leak in i2b_PVK in error handling.bcook2018-08-051-14/+10
* Document that X509_{NAME,REQ,REQ_INFO}_free() are all NULL safe.tb2018-07-292-4/+19