summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
...
* Check the return value of ASN1_STRING_set(), for it may fail to allocatemiod2015-07-184-12/+28
* Remove support for the SSL_OP_TLS_D5_BUG compat hack from SSLeay.doug2015-07-186-28/+22
* Unbreak, add errno headerjeremy2015-07-181-1/+2
* set errno in null cases, just in case.tedu2015-07-181-2/+3
* standards compliant error return (null). will make ruby happier, at least.tedu2015-07-181-5/+2
* Fix leak found by coverity, issue 78897 - which also brough tobeck2015-07-186-50/+66
* delete doubled words;schwarze2015-07-178-8/+8
* extenstion -> extensionmiod2015-07-172-2/+2
* fix leak, found by coverity, ID 78877beck2015-07-171-3/+3
* Convert ssl_parse_serverhello_use_srtp_ext to CBS.doug2015-07-174-24/+34
* Remove SSLv3 support from openssl(1) s_time.doug2015-07-171-13/+3
* Remove SSLv3 support from openssl(1) s_server.doug2015-07-171-7/+2
* Remove SSLv3 support from openssl(1) s_client.doug2015-07-171-4/+1
* Remove support for SSLv3 from openssl(1) ciphers.doug2015-07-171-27/+5
* Remove compat hack that disabled ECDHE-ECDSA on OS X.doug2015-07-1710-208/+26
* Remove workaround for TLS padding bug from SSLeay days.doug2015-07-1713-79/+25
* Bump LIBRESSL_VERSION defines.bcook2015-07-162-6/+14
* Enforce V_ASN1_OCTET_STRING type before accessing the object as octet string;miod2015-07-162-4/+8
* fix coverity leak - ID 78921beck2015-07-161-3/+11
* kill leak, found by coverity, ID 105348beck2015-07-161-2/+5
* After reading a password with terminal echo off, restore the terminal toguenther2015-07-162-12/+10
* Explicitely cast a char into unsigned long before shifting it left by 24, formiod2015-07-162-4/+4
* Check return value of all used functions in OCSP_REQUEST_print(); coversmiod2015-07-162-10/+18
* Make sure the `reject negative sizes' logic introduced in 1.34 is actuallymiod2015-07-162-6/+8
* check n before cbs_init, coverity - ID 125063beck2015-07-152-6/+18
* test for n<0 before use in CBS_init - mostly to shut up coverity.beck2015-07-156-22/+66
* Flense out dead code, we don't do ecdhe_clnt_cert.beck2015-07-154-374/+150
* Fix inverted test in previous. Commit message told what we intended, butmiod2015-07-152-4/+4
* Remove dead code. Coverity CID 21688miod2015-07-152-8/+2
* Fix two theoretical NULL pointer dereferences which can only happen if youmiod2015-07-152-8/+18
* Fix possible 32 byte buffer overrun, found by coverity, CID 78869beck2015-07-152-4/+4
* Memory leak; Coverity CID 78836miod2015-07-152-12/+16
* Unchecked allocations, and make sure we do not leak upon error. Fixesmiod2015-07-152-42/+72
* Avoid leaking objects upon error; tweaks & ok doug@miod2015-07-152-36/+36
* Do not allow TS_check_signer_name() with signer == NULL frommiod2015-07-152-2/+8
* Previous fix for Coverity CID 21785 did not cope correctly with seed_len != 0,miod2015-07-152-2/+6
* Add OPTION_ARG_LONG for handling of options with a long type.jsing2015-07-152-3/+16
* Make 'openssl pkeyutl -verify' return exit code 0 on success.bcook2015-07-151-4/+5
* Partially convert ssl3_get_message to CBS.doug2015-07-142-12/+30
* Convert dtls1_get_hello_verify to CBS.doug2015-07-142-34/+46
* Convert ssl3_get_cipher_by_char to CBS.doug2015-07-142-4/+16
* Convert ssl3_get_client_certificate to CBS.doug2015-07-142-30/+38
* Convert ssl3_get_finished to CBS.doug2015-07-142-12/+18
* Convert ssl_parse_clienthello_use_srtp_ext to CBS.doug2015-07-144-84/+50
* Convert ssl3_get_cert_status to CBS.doug2015-07-142-34/+52
* Convert ssl3_get_server_certificate to CBS.doug2015-07-142-34/+36
* Unhook tls_ext_alpn test until the code passes it.doug2015-07-131-2/+5
* Convert openssl(1) dh to the new option handling.doug2015-07-121-98/+111
* Convert openssl(1) dsa to the new option handling.doug2015-07-121-154/+208
* Convert openssl(1) ec to the new option handling.doug2015-07-121-170/+247