summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Expand)AuthorAgeFilesLines
* Stop handling broken PKCS#8 formats in openssl(1).tb2018-08-241-52/+2
* Remove EVP_PKEY2PKCS8_broken() and PKCS8_set_broken()tb2018-08-245-98/+46
* Document const change for OCSP_cert_to_id()tb2018-08-241-4/+4
* Add const to two arguments of OCSP_cert_to_id()tb2018-08-242-6/+7
* Provide X509_get0_serialNumber()tb2018-08-243-2/+10
* Turn a number of #defines into proper functions with prototypes matchingtb2018-08-245-18/+80
* Change PEM_Sign{Init,Update}() to return an int.tb2018-08-242-8/+8
* Check return value of EVP_EncodeUpdate() in PEM_write_bio().tb2018-08-241-2/+3
* Check return value of EVP_EncodeUpdate() in b64_write().tb2018-08-241-3/+4
* Convert EVP_EncodeUpdate() to return an int to allow for errortb2018-08-242-8/+10
* Provide EVP_CIPHER_CTX_encrypting().tb2018-08-243-2/+10
* unifdef DTLS1_AD_MISSING_HANDSHAKE_MESSAGE.jsing2018-08-242-26/+3
* Document prototype change and return values for BIO_set_cipher()tb2018-08-241-3/+5
* Return an int in BIO_set_cipher() to be able to report errors.tb2018-08-242-13/+22
* In DSO_up_ref(), check return value of CRYPTO_add() and reporttb2018-08-241-3/+5
* In ENGINE_up_ref(), check return value of CRYPTO_add() and reporttb2018-08-241-3/+5
* Document new prototype and return values of X509_OBJECT_up_ref_count()tb2018-08-241-3/+6
* Make X509_OBJECT_up_ref_count return an int.tb2018-08-242-9/+7
* Update documentation of CRYPTO_mem_leaks*.tb2018-08-241-6/+12
* Let CRYPTO_mem_leaks{,_fp,_cb}() return -1.tb2018-08-242-12/+12
* Simplify session ticket parsing/handling.jsing2018-08-244-69/+46
* Pull up the parsing of a ClientHello.jsing2018-08-241-20/+20
* Add my copyright.tb2018-08-241-1/+2
* Remove DSA from TODO list and add RSA-PSS back.tb2018-08-241-2/+2
* Also test DSA with the DER encoded key. Lots of help from jsing, thanks!tb2018-08-241-1/+27
* Clean up handshake message start/finish functions.jsing2018-08-246-76/+38
* Run our DSA against wycheproof test vectors.tb2018-08-231-1/+129
* Add license header.inoguchi2018-08-231-0/+17
* Check reusing SSL/TLS session ticket by regression testinoguchi2018-08-231-8/+38
* Use a monotonic clock for the benchmark timeout.cheloha2018-08-221-24/+9
* Correct session ticket encryption.jsing2018-08-221-4/+11
* fix return valuetb2018-08-211-3/+3
* Remove ChaCha20-Poly1305 from the TODO listtb2018-08-211-2/+2
* A failure to _seal() should be looked into, so turn this into antb2018-08-211-7/+2
* Factor the calls to EVP_AEAD_CTX_open() and EVP_AEAD_CTX_seal() intotb2018-08-211-48/+76
* Merge duplicate benchmark() GET/SSL_shutdown blocks into doConnection().cheloha2018-08-211-41/+25
* typo in argument type, from Mario dot Andres dot Campos at gmail dot comschwarze2018-08-211-3/+3
* add two missing \ntb2018-08-201-3/+3
* Test EVP_AEAD_CTX_open() at the same time as EVP_AEAD_CTX_seal()tb2018-08-201-5/+23
* remove two redundant teststb2018-08-201-10/+1
* Use sealed instead of out in a couple of places in preparation oftb2018-08-201-12/+13
* Shuffle the decoding of the hex strings to the top and group all lengthtb2018-08-201-22/+26
* Run the Wycheproof ChaCha20-Poly1305 test vectors against libcrypto.tb2018-08-201-1/+141
* Don't leak sktmp in X509_verify_cert().tb2018-08-191-5/+5
* whitespace fixtb2018-08-191-2/+2
* Don't leak db on error in RSA_padding_check_PKCS1_OAEP().tb2018-08-191-7/+7
* Don't leak a strdup()'ed string on error in do_accept().tb2018-08-191-1/+3
* Rename and collapse tls12_get_sigandhash_cbb().jsing2018-08-194-39/+28
* Convert ssl3_send_newsession_ticket() to CBB.jsing2018-08-191-55/+64
* Plug SSL object leaks in doConnection().cheloha2018-08-181-32/+22