summaryrefslogtreecommitdiff
path: root/src (unfollow)
Commit message (Expand)AuthorFilesLines
2018-08-26fix the same "an non" issue found by tb in EVP_EncryptInit.3;jmc1-3/+3
2018-08-26Check return value of EVP_CipherInit_ex()tb1-6/+15
2018-08-26Run Wycheproof AES-CBC-PKCS5 testvectors against libcrypto.tb1-1/+189
2018-08-26Remove some redundant info from log.Fatalftb1-2/+2
2018-08-26simplify returned valuetb1-2/+2
2018-08-26Some of the functions in this manual need <openssl/dsa.h>, otherstb1-3/+45
2018-08-26typo: an nonce -> a noncetb1-3/+3
2018-08-26Stop s_server if error occurs in regress appstest.shinoguchi1-4/+13
2018-08-25Also run DSA tests with the PEM encoded public key.tb1-2/+22
2018-08-24update usage for pkcs8;jmc1-10/+9
2018-08-24tweak previous;jmc1-3/+3
2018-08-24crank majors after symbol addition/modification/removaltb3-6/+6
2018-08-24Adjust documentation for SSL_copy_session_id()tb1-8/+7
2018-08-24Let SSL_copy_session_id() return an int for error checking.tb3-28/+31
2018-08-24Add const to EVP_PKCS82PKEY().tb2-4/+4
2018-08-24Add consts to EVP_PKEY_asn1_set_private()tb8-16/+16
2018-08-24After removing support for broken PKCS#8 formats (it was high time),tb7-22/+19
2018-08-24The broken pkcs8 formats generated by openssl pkcs -{embed,nooct,nsdb}tb1-22/+2
2018-08-24Stop handling broken PKCS#8 formats in openssl(1).tb1-52/+2
2018-08-24Remove EVP_PKEY2PKCS8_broken() and PKCS8_set_broken()tb5-98/+46
2018-08-24Document const change for OCSP_cert_to_id()tb1-4/+4
2018-08-24Add const to two arguments of OCSP_cert_to_id()tb2-6/+7
2018-08-24Provide X509_get0_serialNumber()tb3-2/+10
2018-08-24Turn a number of #defines into proper functions with prototypes matchingtb5-18/+80
2018-08-24Change PEM_Sign{Init,Update}() to return an int.tb2-8/+8
2018-08-24Check return value of EVP_EncodeUpdate() in PEM_write_bio().tb1-2/+3
2018-08-24Check return value of EVP_EncodeUpdate() in b64_write().tb1-3/+4
2018-08-24Convert EVP_EncodeUpdate() to return an int to allow for errortb2-8/+10
2018-08-24Provide EVP_CIPHER_CTX_encrypting().tb3-2/+10
2018-08-24unifdef DTLS1_AD_MISSING_HANDSHAKE_MESSAGE.jsing2-26/+3
2018-08-24Document prototype change and return values for BIO_set_cipher()tb1-3/+5
2018-08-24Return an int in BIO_set_cipher() to be able to report errors.tb2-13/+22
2018-08-24In DSO_up_ref(), check return value of CRYPTO_add() and reporttb1-3/+5
2018-08-24In ENGINE_up_ref(), check return value of CRYPTO_add() and reporttb1-3/+5
2018-08-24Document new prototype and return values of X509_OBJECT_up_ref_count()tb1-3/+6
2018-08-24Make X509_OBJECT_up_ref_count return an int.tb2-9/+7
2018-08-24Update documentation of CRYPTO_mem_leaks*.tb1-6/+12
2018-08-24Let CRYPTO_mem_leaks{,_fp,_cb}() return -1.tb2-12/+12
2018-08-24Simplify session ticket parsing/handling.jsing4-69/+46
2018-08-24Pull up the parsing of a ClientHello.jsing1-20/+20
2018-08-24Add my copyright.tb1-1/+2
2018-08-24Remove DSA from TODO list and add RSA-PSS back.tb1-2/+2
2018-08-24Also test DSA with the DER encoded key. Lots of help from jsing, thanks!tb1-1/+27
2018-08-24Clean up handshake message start/finish functions.jsing6-76/+38
2018-08-23Run our DSA against wycheproof test vectors.tb1-1/+129
2018-08-23Add license header.inoguchi1-0/+17
2018-08-23Check reusing SSL/TLS session ticket by regression testinoguchi1-8/+38
2018-08-22Use a monotonic clock for the benchmark timeout.cheloha1-24/+9
2018-08-22Correct session ticket encryption.jsing1-4/+11
2018-08-21fix return valuetb1-3/+3