summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Simplify after EC_POINT_get_curve() additiontb2021-04-202-30/+8
* Adjust ectest.c for EC_GROUP_{g,s}et_curve changetb2021-04-202-15/+15
* Add prototypes for EC_GROUP_get_curve_{GF2m,GFp}().tb2021-04-201-1/+6
* Compare function pointers against NULL, not 0.tb2021-04-201-3/+3
* Prepare to provide EC_GROUP_{get,set}_curve(3)tb2021-04-206-41/+51
* Remove new_sym_enc and new_aead.jsing2021-04-193-10/+19
* Avoid division by zero in hybrid point encodingtb2021-04-191-17/+49
* Move new_mac_secret_size into the TLSv1.2 handshake struct.jsing2021-04-192-5/+7
* Move reuse_message, message_type, message_size and cert_verify into thejsing2021-04-196-59/+62
* Set alpn_selected_len to zero when freeing alpn_selected.jsing2021-04-191-1/+2
* The powerpc64 ELFv2 ABI explicitly states that exception enable bitskettenis2021-04-191-1/+9
* mention DTLS1_2_VERSIONtb2021-04-151-3/+4
* Mention DTLS1_2_VERSION here, tootb2021-04-151-6/+8
* Document SSL_OP_NO_DTLSv1{,_2}tb2021-04-151-2/+15
* Document DTLSv1_2_{,client_,server_}method(3)tb2021-04-151-4/+36
* Merge documentation for SSL_is_dtls() from OpenSSLtb2021-04-151-5/+21
* Switch back to the legacy verifier for the release.tb2021-04-151-2/+2
* revert previous. some of the keyupdate tests still fail occasionallytb2021-04-141-2/+11
* Enable test-tls13-keyupdate.pytb2021-04-141-9/+2
* move test-record-size-limit.py to unsupportedtb2021-04-141-4/+3
* enable test-record-layer-fragmentation.pytb2021-04-141-7/+2
* factor argument to catch an alert mismatch into a helper functiontb2021-04-141-7/+8
* enable test-tlsfuzzer-invalid-compression-methods.pytb2021-04-131-5/+10
* enable test-large-hello.py as a slow testtb2021-04-131-3/+2
* with new defaults, test-fuzzed-plaintext.py is no longer slowtb2021-04-131-3/+2
* move a few tests to the unsupported group and fix two commentstb2021-04-131-15/+15
* annotate test-ecdhe-rsa-key-exchange-with-bad-messages.py with expectedtb2021-04-131-2/+3
* Update a stale comment and fix a typo.tb2021-04-111-3/+3
* An extra internal consistency check and a missing stats adjustment. ok tb@otto2021-04-091-1/+4
* Cache implementation has changed, we do not hold on to an exact numberotto2021-04-091-3/+4
* Enable test-cve-2016-6309.pytb2021-04-081-3/+2
* Avoid clobbering the error code when sending an alerttb2021-04-071-2/+3
* Use ERR_print_error_fp() to avoid leaking a BIO in fatal()tb2021-04-071-2/+2
* Check function return value in openssl(1) x509.cinoguchi2021-04-071-24/+71
* Avoid leak in error pathinoguchi2021-04-071-3/+7
* use errx() instead of err()tb2021-04-061-8/+8
* spaces -> tabstb2021-04-061-5/+5
* minor style tweakstb2021-04-061-5/+6
* Don't leak param->name in x509_verify_param_zero()tb2021-04-051-1/+2
* Add missing error check for AES_unwrap_key().tb2021-04-041-1/+3
* Fix two copy paste errors in error messagestb2021-04-041-3/+3
* Add tests for DTLSv1_2{,_client,_server}_method()tb2021-04-041-1/+20
* Use correct type for tmp in test_write_bytes()tb2021-04-041-2/+2
* Explicitly NULL pointers to avoid a double free.tb2021-04-041-1/+3
* Don't leak key and dh in the error path.tb2021-04-041-4/+7
* Clean up client and server tls{,_config} contexts in tls_test().tb2021-04-041-2/+11
* Run the CMAC tests through EVP_PKEY_new_CMAC_key().tb2021-04-031-10/+22
* Two cases of BRE involving counts and backrefs that go wrong andotto2021-04-021-1/+16
* Show DTLS1.2 message with openssl(1) s_server and s_clientinoguchi2021-04-021-2/+6
* Compare the pointer variable explicitly with NULL in if conditioninoguchi2021-04-011-18/+17