summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Expand)AuthorAgeFilesLines
* move X509_get0_serialNumber where it belongstb2018-11-021-1/+1
* whitespacetb2018-11-021-2/+2
* Make the documentation of -conv_form match reality. It defaultstb2018-11-011-6/+6
* show what went wrong with a unix domain socket, rather than fail silentlydlg2018-10-261-2/+4
* Bump libcrypto/libssl/libtls majors due to symbol removals (libcrypto)jsing2018-10-243-6/+6
* Make more of libssl's record layer state internal.jsing2018-10-248-88/+86
* Remove a GOST data symbol that should not be exported.jsing2018-10-241-1/+0
* Remove a bunch of ancient and highly crufty ASN.1 related code fromjsing2018-10-249-1633/+22
* Remove stack related macros that should have been nuked whenjsing2018-10-241-333/+1
* Avoid calling memcpy with a length <= 0. Reported due to a GCC 7.3.0tb2018-10-201-5/+6
* With the fixed length checks in aes_wrap.c 1.11, we can remove the uglytb2018-10-201-11/+3
* RFC 3394 section 2 states that we need at least two 64 bit blockstb2018-10-201-6/+6
* Run Wycheproof testvectors for AES Key Wrap without padding (RFC 3394)tb2018-10-191-4/+144
* truncate long comments in audit summarytb2018-10-191-2/+7
* simplify BN_bin2bn() calls; no need to pre-declare the variable.tb2018-10-181-11/+6
* Avoid a bad out of bounds access that caused intermittent crashes.tb2018-10-181-2/+2
* whitespace cleanup and other minor things from gofmttb2018-10-071-44/+39
* make sure all CStrings are freedtb2018-10-061-3/+7
* plug a memory leaktb2018-10-061-1/+2
* wrap a few more overlong linestb2018-10-061-14/+36
* wrap some overlong fmt.Printfstb2018-10-061-53/+106
* It's slightly simpler to get the ECDH public key as an EC_POINT by usingtb2018-10-061-16/+15
* free EC_POINT and EC_GROUPtb2018-10-061-1/+4
* Run Wycheproof ECDH Web Crypto test vectors against libcrypto.tb2018-10-061-6/+155
* merge runECDSAWebCryptoTest() into runECDSATest()tb2018-10-061-53/+31
* factor ECDSA signature extraction into its own functiontb2018-10-061-24/+35
* make allocate/use/defer dances more consistent in ECDSA sig extractiontb2018-10-061-9/+8
* Run Wycheproof ECDSA Web Crypto test vectors against libcrypto.tb2018-10-051-7/+166
* Better refer to RFC 8422 which obsoletes RFC 4492.tb2018-10-041-2/+2
* While we don't explicitly support curve secp256r1, we can run 1250 teststb2018-10-041-11/+2
* Plug TLS context leak in nc(1) server and client mode. Movebluhm2018-10-041-12/+10
* As per POSIX, when str{,r}chr is comparing it should convert c to a char.martijn2018-10-014-8/+10
* in ECDH, gather statistics where it makes more sensetb2018-09-301-8/+5
* bump for LibreSSL 2.8.2bcook2018-09-301-3/+3
* -T applies to ip6 too, apparently;jmc2018-09-251-4/+4
* bump for LibreSSL 2.8.1libressl-v2.8.1bcook2018-09-231-3/+3
* Add a comment on the acceptable RSASSA cases.tb2018-09-221-2/+3
* gather statistics in checkAead{Open,Seal}() as well.tb2018-09-221-1/+7
* remove some unneeded checkstb2018-09-221-15/+5
* gather and print some statistics on the acceptable cases we need totb2018-09-221-8/+60
* more flags printingtb2018-09-221-23/+23
* improve logic involving acceptableAudittb2018-09-221-5/+5
* Swap order of "action" and "wt.Flags" in a few fmt.Printfs.tb2018-09-221-17/+17
* Introduce a couple of convenience targets to help with auditing thetb2018-09-222-5/+41
* Print the flags field in INFO: and FAIL: messages. It's helpful intb2018-09-211-17/+17
* fix order of arguments in fmt.Printf()tb2018-09-181-2/+2
* Simplify initialization of asn1_cb; use correct spelling of NULL.tb2018-09-171-4/+2
* Move tally mark printing out of the main benchmark loop; ok tb@cheloha2018-09-171-14/+21
* add missing default case to switchtb2018-09-161-1/+3
* EVP_aead_chacha20_poly1305() can't actually fail.tb2018-09-161-4/+1