summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Expand)AuthorAgeFilesLines
* Improve DTLS record header parsing.jsing2021-09-041-7/+7
* Disable tests that don't work in bluhms regress framework.mbuhl2021-09-041-1/+7
* Add X509 Extensions for IP Addresses and AS Identifiersjob2021-09-031-1/+2
* * add the missing STANDARDS section as noticed by tb@schwarze2021-09-031-3/+20
* Implement a -h option that allows specifying a target host thattb2021-09-031-9/+13
* Now that the issue is fixed, enable test-extensions.pytb2021-09-031-6/+2
* Use SSL3_HM_HEADER_LENGTH instead of the magic number 4.jsing2021-09-031-13/+14
* Ensure that a server hello does not have trailing data.jsing2021-09-031-1/+4
* Ensure that a client hello does not have trailing data.jsing2021-09-031-1/+4
* Set message_size correctly when switching to the legacy stack.jsing2021-09-031-2/+2
* Make Bob happy.bluhm2021-09-031-1/+5
* Call the callback on success in new verifier in a compatible waybeck2021-09-034-19/+56
* Unroll ASN1_ITEM_ref()job2021-09-021-1/+1
* Change OPENSSL_strdup() to strdup()job2021-09-021-1/+1
* Change OPENSSL_malloc to calloc()job2021-09-021-1/+2
* Repair unrolling of static ASN1_ITEM IPAddrBlocks_itjob2021-09-021-0/+11
* Make v3_addr and v3_asid extern constjob2021-09-021-2/+2
* Add err.h for X509error() and friendsjob2021-09-022-0/+2
* Fix OPENSSL_assert() and assert()job2021-09-022-35/+17
* Unroll ASN1_EX_TEMPLATE_TYPE IPAddrBlocksjob2021-09-021-4/+7
* Change the OPENSSL_strdup() to strdup()job2021-09-021-3/+4
* Fix header file includesjob2021-09-022-8/+9
* Move the error put functions from X509V3err() to X509V3error()job2021-09-022-52/+32
* Unroll ASN1_SEQUENCE() ASN1_CHOICE() ASN1_ITEM_TEMPLATE()job2021-09-022-46/+218
* Add -f to usagetb2021-09-021-2/+2
* OPENSSL_assert() is not appropriate in this contextjob2021-09-021-2/+3
* Replace ossl_assert()/assert() with OPENSSL_assert()job2021-09-022-14/+14
* Enable vfork syscall test. Disable SIGSTOP test as it is masked untilmbuhl2021-09-025-6/+45
* We need to allow for either a CERTIFICATE or CERTIFICATE_STATUS messagebeck2021-09-021-2/+3
* Replace OPENSSL_free() with free()job2021-09-022-7/+7
* Unroll IMPLEMENT_ASN1_FUNCTIONS()job2021-09-022-8/+197
* Unroll DECLARE_ASN1_FUNCTIONS()job2021-09-021-9/+56
* Rename DEFINE_STACK_OF() to DECLARE_STACK_OF()job2021-09-021-4/+4
* Lay groundwork to support X.509 v3 extensions for IP Addresses and AS Identif...job2021-09-027-5/+2386
* Import more NetBSD system call regression tests.mbuhl2021-09-0217-50/+2350
* Call the ocsp callback if present and we get no response, instead ofbeck2021-09-021-3/+2
* Use defined constantsinoguchi2021-09-021-16/+16
* Add DB_TYPE_SUSPinoguchi2021-09-021-1/+2
* Correct the is_server flag in the call to the debug callback to be correct.beck2021-09-021-2/+2
* Move subject check process after the subject edit processinoguchi2021-09-021-105/+106
* delete %n using test cases, which now intentionally faultderaadt2021-09-021-13/+1
* RFC 6066 section 8 allows the server MAY choose not send the CertificateStatusbeck2021-09-021-3/+37
* inet_ntop(3) needs sys/socket.h for AF_INET / AF_INET6 so add the headerclaudio2021-09-012-6/+5
* comment out the detailed description of SSL_get_servername(3),schwarze2021-09-011-7/+9
* Remove assignment of value that is never read.beck2021-09-011-2/+1
* remove manual fiddling with MALLOC_OPTIONS from libc regress testsjasper2021-09-015-20/+5
* Add a regression test to verify that we call the callback in the samebeck2021-09-013-4/+551
* Remove some dead code that was missed in an earlier cleanup andtb2021-08-311-4/+3
* Defragment DTLS.jsing2021-08-312-123/+48
* Remove a nonsensical s->version == TLS1_VERSION from DTLS code.jsing2021-08-311-6/+1