summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Expand)AuthorAgeFilesLines
* Provide EVP_PKEY_CTX_md().jsing2019-10-292-8/+18
* Free maskHash when RSA_PSS_PARAMS is freed.jsing2019-10-251-3/+23
* Service names are still resolved with -nkn2019-10-241-4/+4
* Provide ASN1_TYPE_{,un}pack_sequence().jsing2019-10-242-2/+36
* Provide RSA_OAEP_PARAMS along with ASN.1 encoding/decoding.jsing2019-10-242-2/+97
* Bump libcrypto, libssl and libtls majors due to changes in struct sizesjsing2019-10-243-6/+6
* Add RSA_PSS_PARAMS pointer to RSA struct.jsing2019-10-241-1/+8
* Add maskHash field to RSA_PSS_PARAMS.jsing2019-10-241-1/+4
* Provide RSA_pkey_ctx_ctrl().jsing2019-10-243-2/+20
* Add EVP_PKEY_RSA_PSS.jsing2019-10-241-1/+2
* Print IP address in verbose modejob2019-10-241-12/+34
* Revert previous, which works for -N case but causes regress failuresbeck2019-10-231-18/+1
* Sync RSA_padding_check_PKCS1_OAEP_mgf1().jsing2019-10-171-64/+111
* Fix -N flag to actually shut down the (entire) socket when the inputbeck2019-10-171-1/+18
* Provide err_clear_last_constant_time() as a way of clearing an error fromjsing2019-10-172-1/+24
* bump internal version to 3.0.2bcook2019-10-101-2/+2
* bump to 3.0.2bcook2019-10-101-2/+2
* Use EVP_MAX_MD_SIZE instead of SHA_DIGEST_LENGTH and remove OPENSSL_NO_SHA*jsing2019-10-091-7/+2
* Fix a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey.tb2019-10-044-11/+35
* Use a valid curve when constructing an EC_KEY that looks like X25519.jsing2019-10-041-2/+3
* Provide internal RSA_padding_{add,check}_PKCS1_OAEP_mgf1() functions.jsing2019-10-042-10/+90
* Avoid a path traversal bug in s_server on Windows.bcook2019-10-041-3/+3
* the formatting for the mini synopses in this page did not render welljmc2019-10-041-115/+179
* Move towards making RSA OAEP functions handle arbitrary message digests.jsing2019-10-031-53/+59
* bump for LibreSSL 3.0.1libressl-v3.0.1bcook2019-09-301-3/+3
* zap trailing whitespace;jmc2019-09-291-3/+3
* If a NULL or zero cofactor is passed to EC_GROUP_set_generator(),tb2019-09-293-11/+113
* Xr random 4 in a better wayderaadt2019-09-281-3/+5
* Add comment line saying S is described vaguely on purpose.otto2019-09-141-2/+3
* document EVP_PKEY_CTX_get_signature_md(3);schwarze2019-09-101-4/+17
* Plug memory leak in error paths. Found while comparing this filetb2019-09-091-5/+5
* Provide EVP_PKEY_CTX_get_signature_md() macro and implement thejsing2019-09-094-7/+25
* Load CMS error strings.jsing2019-09-091-1/+5
* Move #include <openssl/cms.h> to more appropriate location (since it isjsing2019-09-091-3/+2
* Install the openssl/cms.h header.jsing2019-09-091-1/+3
* Add CMS ECC support.jsing2019-09-081-2/+370
* Add various macros and controls for EC_PKEY_CTX.jsing2019-09-064-28/+316
* Handle CMS PEM headers.jsing2019-09-061-1/+11
* Add objects for ECDH schemes in RFC 5753.jsing2019-09-052-0/+32
* Build ecdh_kdf.cjsing2019-09-051-2/+2
* Replace OPENSSL_cleanse() with explicit_bzero().jsing2019-09-051-1/+1
* Provide prototype for ecdh_KDF_X9_63()jsing2019-09-051-1/+7
* Include correct header.jsing2019-09-051-1/+1
* style(9) and whitespace.jsing2019-09-051-65/+72
* Restore per-file license/copyright removed in OpenSSL commit 4f22f40507f.jsing2019-09-051-5/+48
* Remove ECDH_KDF_X9_62 wrapper.jsing2019-09-051-12/+0
* Provide ECDH KDF for X9.63 as needed for CMS ECC.jsing2019-09-051-0/+81
* Feed the bntest output to bc(1). This checks the result of the bigbluhm2019-09-052-13/+16
* Document EVP_PKEY_get0(3), EVP_PKEY_assign_GOST(3), EVP_PKEY_assign(3),schwarze2019-09-012-31/+116
* mop up resolver.3 rename; ok deraadtjmc2019-08-305-15/+15