summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Expand)AuthorAgeFilesLines
* Sync bs_cbb.c with libssl.tb2022-07-071-1/+4
* Make CBB_finish() fail if *out_data is not NULLtb2022-07-071-1/+4
* Initialize hkdf_label to NULL.tb2022-07-071-2/+2
* Use a local bits variable to avoid ugly line break due to nested functiontb2022-07-071-6/+16
* Use the security level knob in the test script.tb2022-07-071-2/+14
* Only run tests against ciphers supported by the method.tb2022-07-072-4/+28
* Add some minimal regress coverage for the security level.tb2022-07-071-1/+6
* Make the ssltest security level aware.tb2022-07-071-1/+9
* Bump libtls minor after libcrypto and libssl minor bumptb2022-07-071-1/+1
* Unifdef LIBRESSL_HAS_SECURITY_LEVEL and remove some workaroundstb2022-07-073-35/+4
* Bump minor after symbol additiontb2022-07-071-1/+1
* Update Symbols.listtb2022-07-072-0/+25
* Expose security level symbols and error codes in the headers.tb2022-07-072-6/+2
* bump minor after symbol additiontb2022-07-071-1/+1
* Expose new API in headers.tb2022-07-077-31/+7
* Switch ssltest to using the newly generated certs that use SHA-256 insteadtb2022-07-072-8/+6
* Add missing X509_V_ERR_ strings using the ones from OpenSSL.tb2022-07-051-1/+17
* Use secop instead of op everywheretb2022-07-051-15/+15
* Pull setting of is_ee out of the function calls to appease scan-buildtb2022-07-051-3/+5
* cope with ASN1_TIME_set_string_X509() renameanton2022-07-051-3/+3
* The OpenSSL API is called ASN1_TIME_set_string_X509() (uppercase x)tb2022-07-042-4/+4
* Bump to LibreSSL 3.6.0tb2022-07-041-3/+3
* Sync with changes in dsa_meth.ctb2022-07-042-11/+12
* Prepare to provide DSA_meth_{get0,set1}_name()tb2022-07-043-8/+35
* Prepare to provide X509_VERIFY_PARAM_get_time()tb2022-07-042-2/+9
* Reword a commenttb2022-07-031-2/+2
* Unwrap a linetb2022-07-031-3/+2
* Update instructions for using curl's mk-ca-bundle script.sthen2022-07-031-4/+4
* Simplify certificate list handling code in legacy server.jsing2022-07-031-62/+50
* Simplify certificate list handling code in legacy client.jsing2022-07-031-45/+33
* Simplify tls1_ec_nid2group_id()tb2022-07-031-98/+10
* Simplify tls1_ec_group_id2{bits,nid}()tb2022-07-031-9/+9
* Call certificate variables cert and certs, rather than x and skjsing2022-07-021-6/+6
* Use ASN1_INTEGER to parse/build (Z)LONG_itjsing2022-07-021-69/+67
* Remove references to openssl/obj_mac.hjsing2022-07-023-12/+11
* Stop using ssl{_ctx,}_security() outside of ssl_seclevel.ctb2022-07-027-23/+60
* Adjust to new tls1_ec_nid2group_id API.tb2022-07-021-7/+13
* Rename uses 'curve' to 'group' and rework tls1 group API.tb2022-07-0212-162/+204
* Fix off-by-one in length check.tb2022-07-021-3/+3
* Make tls1_ec_curve_id2nid() return explicit NID_undef instead of 0 on errortb2022-07-022-5/+5
* To figure our whether a large allocation can be grown into theguenther2022-06-301-12/+2
* Remove redundant commentstb2022-06-301-30/+30
* Check security level for supported groups.tb2022-06-304-35/+179
* Rename variable from tls_version to version since it could also betb2022-06-301-3/+3
* Check whether the security level allows session tickets.tb2022-06-301-2/+6
* Add checks to ensure we do not initiate or negotiate handshakes withtb2022-06-305-7/+34
* Replace obj_mac.h with object.htb2022-06-306-15/+17
* Add valid time test from ruby regress, and check ASN1_time_to_tmbeck2022-06-301-1/+27
* Rename use_* to ssl_use_* for consistency.tb2022-06-301-9/+10
* add valid utc time that should fail to parse as generalizedbeck2022-06-301-2/+6