summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Expose EC_GROUP_order_bits() in <openssl/ec.h>tb2021-09-101-3/+1
* Expose BN_bn2{,le}binpad() and BN_lebin2bn() in <openssl/bn.h>tb2021-09-101-3/+1
* Expose BN_RAND_* in <openssl/bn.h>tb2021-09-101-3/+1
* Do not ignore SSL_TLSEXT_ERR_FATAL from the ALPN callbacktb2021-09-104-7/+31
* Prepare to provide BN_RAND_* flags for BN_rand_range()tb2021-09-101-1/+12
* Prepare to provide SSL_CTX_get0_privatekey()tb2021-09-102-2/+14
* Ensure that the kill signal undergoing testing is not ignored.anton2021-09-091-1/+15
* When calling the legacy callback, ensure we catch the case where itbeck2021-09-091-2/+5
* Rework openssl-ruby-tests to run all passing tests first, thentb2021-09-091-4/+12
* zap trailing whitespacetb2021-09-092-14/+14
* Prepare to provide EC_GROUP_order_bits()tb2021-09-0811-18/+45
* Provide SSL_SESSION_is_resumable and SSL_set_psk_use_session_callback stubstb2021-09-083-3/+24
* Prepare to provide API stubs for PHAtb2021-09-082-2/+27
* Fix leak in cms_RecipientInfo_kekri_decrypt()tb2021-09-081-1/+2
* Prepare to provide SSL_get_tlsext_status_type()tb2021-09-083-3/+20
* Prepare to provide SSL_set0_rbio()tb2021-09-082-2/+12
* Prepare to provide BN_bn2{,le}binpad() and BN_lebin2bn()tb2021-09-082-9/+137
* Replace bare ; with continue;job2021-09-081-7/+7
* Fix indentation of comments and labelsjob2021-09-082-165/+167
* Replace (&(x)) pattern with &xjob2021-09-072-32/+32
* KNFjob2021-09-072-1478/+1548
* The default Ruby has switched to 3.0tb2021-09-061-2/+2
* new sentence, new line, and tweak wording of previous;jmc2021-09-051-2/+3
* Remove unused variable tmptm in do_body of openssl(1) cainoguchi2021-09-051-8/+2
* Using serial number instead as subject if it is empty in openssl(1) cainoguchi2021-09-052-3/+36
* Check extensions before setting version to v3inoguchi2021-09-051-5/+10
* Use accessor method rather than direct X509 structure accessinoguchi2021-09-051-20/+10
* Factor out the TLSv1.3 code that handles content from TLS records.jsing2021-09-046-80/+238
* Refactor ssl_update_cache. This now matches the logic used for TLS 1.3beck2021-09-041-22/+106
* Improve DTLS hello request handling code.jsing2021-09-041-2/+8
* Change dtls1_get_message_header() to take a CBS.jsing2021-09-043-22/+21
* Improve DTLS record header parsing.jsing2021-09-041-7/+7
* Disable tests that don't work in bluhms regress framework.mbuhl2021-09-041-1/+7
* Add X509 Extensions for IP Addresses and AS Identifiersjob2021-09-031-1/+2
* * add the missing STANDARDS section as noticed by tb@schwarze2021-09-031-3/+20
* Implement a -h option that allows specifying a target host thattb2021-09-031-9/+13
* Now that the issue is fixed, enable test-extensions.pytb2021-09-031-6/+2
* Use SSL3_HM_HEADER_LENGTH instead of the magic number 4.jsing2021-09-031-13/+14
* Ensure that a server hello does not have trailing data.jsing2021-09-031-1/+4
* Ensure that a client hello does not have trailing data.jsing2021-09-031-1/+4
* Set message_size correctly when switching to the legacy stack.jsing2021-09-031-2/+2
* Make Bob happy.bluhm2021-09-031-1/+5
* Call the callback on success in new verifier in a compatible waybeck2021-09-034-19/+56
* Unroll ASN1_ITEM_ref()job2021-09-021-1/+1
* Change OPENSSL_strdup() to strdup()job2021-09-021-1/+1
* Change OPENSSL_malloc to calloc()job2021-09-021-1/+2
* Repair unrolling of static ASN1_ITEM IPAddrBlocks_itjob2021-09-021-0/+11
* Make v3_addr and v3_asid extern constjob2021-09-021-2/+2
* Add err.h for X509error() and friendsjob2021-09-022-0/+2
* Fix OPENSSL_assert() and assert()job2021-09-022-35/+17