summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
...
* 1.18 would introduce a possible out-of-bounds access in the error path;miod2015-02-142-14/+10
* Remove DEBUG_PKCS5V2 code.miod2015-02-142-50/+2
* Unchecked allocations in x509_name_canon().miod2015-02-142-2/+10
* Memory leak upon error in X509_add1_{trust,reject}_object.miod2015-02-142-14/+46
* Manually expand IMPLEMENT_EXTERN_ASN1 macro (the only occurence in crypto).jsing2015-02-142-6/+20
* Remove IMPLEMENT_COMPAT_ASN1() and related support code. Nothing uses it inmiod2015-02-1410-282/+14
* Make asn1_ex_i2c() static. ok jsing@miod2015-02-142-4/+8
* Memory leak in `should not happen' condition; Coverity CID 78889.miod2015-02-142-8/+8
* Memory leak upon error; Coverity CID 78857miod2015-02-142-2/+8
* Check i2d_name_canon() for failure (negative return). Coverity CID 78888.miod2015-02-142-12/+16
* Possible NULL pointer dereferences. Coverity CID 21719, 21732.miod2015-02-144-6/+14
* Potential NULL dereference in the error path; Coverity CID 21720miod2015-02-142-4/+4
* Coverity CID 21733 (unchecked allocation), 78823 (leak on error).miod2015-02-142-2/+12
* Check for allocation error in RSA_eay_mod_exp(). Coverity CID 25217.miod2015-02-144-4/+14
* Memory leaks upon error. Coverity CID 78874.miod2015-02-142-20/+20
* Fix tests that got incorrectly inverted with the BN_CTX_get() return checkjsing2015-02-142-10/+10
* Expand ASN1_CHOICE*, ASN1_SEQUENCE* and associated macros, making thejsing2015-02-146-120/+832
* Expand ASN1_CHOICE*, ASN1_SEQUENCE* and associated macros, making thejsing2015-02-142-18/+106
* Attempt to correctly free temporary storage upon error. With help frommiod2015-02-142-30/+36
* second batch of perlpod(1) to mdoc(7) conversionschwarze2015-02-1423-924/+1381
* While doing development work on pod2mdoc(1),schwarze2015-02-1411-534/+773
* Spell NULL correctly, be explicit with NULL checks and it is also easier tojsing2015-02-144-20/+12
* Fix pod markup error.miod2015-02-141-1/+1
* Try and fix a bunch of memory leaks upon error;miod2015-02-146-24/+66
* Consistently check the return value from BN_CTX_get() on assignment.jsing2015-02-148-84/+88
* End sentences with dots.miod2015-02-131-3/+3
* Don't leak memory on errors - fixes coverity issues 105353 105253beck2015-02-132-8/+18
* fix leaking of bn, coverity issue 105351beck2015-02-132-2/+4
* prevent a crash with openssl asn1parse -genstr FORMATjsg2015-02-122-2/+10
* bump minor for TLS_PROTOCOLS_ALL. OK jsing@reyk2015-02-121-1/+1
* Add a tls_config_parse_protocols() function that allows a protocols stringjsing2015-02-122-2/+63
* Fix handling of "legacy" mode for tls_config_set_dheparams().jsing2015-02-121-2/+2
* qsort() compare functions MUST use memcmp() instead of bcmp() to haveguenther2015-02-121-2/+4
* Change TLS_PROTOCOLS_DEFAULT to be TLSv1.2 only. Add a TLS_PROTOCOLS_ALLjsing2015-02-121-2/+4
* If you do not support POSIX I/O then you're not tall enough to ride...jsing2015-02-128-46/+8
* unifdef -m -UOPENSSL_NO_NEXTPROTONEG - NPN is being replaced with ALPN,jsing2015-02-128-48/+8
* swap limits.h for sys/limits.hbcook2015-02-121-1/+1
* use a width specifier for lists, and Sq rather than Dq for single lettersjmc2015-02-111-3/+3
* Provide a tls_connect_servername() function that has the same behaviourjsing2015-02-114-6/+27
* Be consistent with naming - only use "host" and "hostname" when referringjsing2015-02-116-60/+61
* Do not rely upon malloc(0) not returning NULL. Not all malloc implementationsmiod2015-02-111-6/+10
* Guenther has plans for OPENSSL_NO_CMS, so revert this for the moment.beck2015-02-1118-24/+246
* the possible algos for pref should be documented heretedu2015-02-111-4/+11
* Remove initialisers with default values from the ASN1 data structures.jsing2015-02-1134-376/+46
* get rid of OPENSSL_NO_CMS code we do not use.beck2015-02-1118-246/+24
* get rid of OPENSSL_NO_COMP code we don't use.beck2015-02-114-22/+4
* Expand most of the ASN1_SEQUENCE* and associated macros, making the datajsing2015-02-1134-292/+1900
* Enable building with -DOPENSSL_NO_DEPRECATED.doug2015-02-1161-61/+142
* More unifdef OPENSSL_NO_RFC3779 that got missed last time around.jsing2015-02-114-32/+4
* Introduce an openssl(1) certhash command.jsing2015-02-103-9/+685