summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Expand)AuthorAgeFilesLines
* In DSO_up_ref(), check return value of CRYPTO_add() and reporttb2018-08-241-3/+5
* In ENGINE_up_ref(), check return value of CRYPTO_add() and reporttb2018-08-241-3/+5
* Document new prototype and return values of X509_OBJECT_up_ref_count()tb2018-08-241-3/+6
* Make X509_OBJECT_up_ref_count return an int.tb2018-08-242-9/+7
* Update documentation of CRYPTO_mem_leaks*.tb2018-08-241-6/+12
* Let CRYPTO_mem_leaks{,_fp,_cb}() return -1.tb2018-08-242-12/+12
* Simplify session ticket parsing/handling.jsing2018-08-244-69/+46
* Pull up the parsing of a ClientHello.jsing2018-08-241-20/+20
* Add my copyright.tb2018-08-241-1/+2
* Remove DSA from TODO list and add RSA-PSS back.tb2018-08-241-2/+2
* Also test DSA with the DER encoded key. Lots of help from jsing, thanks!tb2018-08-241-1/+27
* Clean up handshake message start/finish functions.jsing2018-08-246-76/+38
* Run our DSA against wycheproof test vectors.tb2018-08-231-1/+129
* Add license header.inoguchi2018-08-231-0/+17
* Check reusing SSL/TLS session ticket by regression testinoguchi2018-08-231-8/+38
* Use a monotonic clock for the benchmark timeout.cheloha2018-08-221-24/+9
* Correct session ticket encryption.jsing2018-08-221-4/+11
* fix return valuetb2018-08-211-3/+3
* Remove ChaCha20-Poly1305 from the TODO listtb2018-08-211-2/+2
* A failure to _seal() should be looked into, so turn this into antb2018-08-211-7/+2
* Factor the calls to EVP_AEAD_CTX_open() and EVP_AEAD_CTX_seal() intotb2018-08-211-48/+76
* Merge duplicate benchmark() GET/SSL_shutdown blocks into doConnection().cheloha2018-08-211-41/+25
* typo in argument type, from Mario dot Andres dot Campos at gmail dot comschwarze2018-08-211-3/+3
* add two missing \ntb2018-08-201-3/+3
* Test EVP_AEAD_CTX_open() at the same time as EVP_AEAD_CTX_seal()tb2018-08-201-5/+23
* remove two redundant teststb2018-08-201-10/+1
* Use sealed instead of out in a couple of places in preparation oftb2018-08-201-12/+13
* Shuffle the decoding of the hex strings to the top and group all lengthtb2018-08-201-22/+26
* Run the Wycheproof ChaCha20-Poly1305 test vectors against libcrypto.tb2018-08-201-1/+141
* Don't leak sktmp in X509_verify_cert().tb2018-08-191-5/+5
* whitespace fixtb2018-08-191-2/+2
* Don't leak db on error in RSA_padding_check_PKCS1_OAEP().tb2018-08-191-7/+7
* Don't leak a strdup()'ed string on error in do_accept().tb2018-08-191-1/+3
* Rename and collapse tls12_get_sigandhash_cbb().jsing2018-08-194-39/+28
* Convert ssl3_send_newsession_ticket() to CBB.jsing2018-08-191-55/+64
* Plug SSL object leaks in doConnection().cheloha2018-08-181-32/+22
* Convert ssl3_send_client_verify() to CBB.jsing2018-08-171-43/+50
* spelling;jmc2018-08-171-2/+2
* Make the wording more concise, use the imperative throughout, stateschwarze2018-08-171-108/+126
* Add regress coverage for CBB_add_u32().jsing2018-08-161-3/+4
* Provide CBB_add_u32(), as needed for an upcoming conversion.jsing2018-08-162-2/+17
* Simplify the add signature code/logic in ssl3_send_server_key_exchange().jsing2018-08-161-13/+8
* Convert ssl3_send_server_key_exchange() to CBB.jsing2018-08-163-47/+71
* Convert ssl3_get_server_key_exchange() to CBS.jsing2018-08-161-69/+55
* Revert previous, which was wrong as noted by schwarze. Also revert a hunktb2018-08-161-4/+7
* Remove unused variable.rob2018-08-161-5/+3
* Add a comment that explains what the check is doing and why len >= 1.tb2018-08-141-1/+2
* The UI_add_{input,verify}_string() functions want a length not includingtb2018-08-141-5/+8
* Remove now unused variable, that got left behind from a previous change.jsing2018-08-141-3/+1
* Actually check the return values for EVP_Sign* and EVP_Verify*.jsing2018-08-142-15/+23