summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
...
* check the sigbuf value before using it.rpointel2015-07-201-2/+7
* Avoid dereferencing a NULL.doug2015-07-201-5/+7
* Remove condition that never happens and fix error handling.doug2015-07-201-6/+5
* Various memory leaks upon error or unchecked allocations.miod2015-07-202-8/+26
* Use V_ASN1_UNDEF instead of -1.miod2015-07-202-14/+14
* Check the return value of asn1_enc_save(). ok bcook@ doug@miod2015-07-202-4/+8
* When freeing an X509_CRL, if freeing the user-maintained meth_data fails,miod2015-07-202-6/+8
* In X509_PKEY_new(), make sure all allocation failures push an error to themiod2015-07-202-14/+30
* add NetLock Kft. CA root certificate, already present in web browsers andsteven2015-07-201-0/+80
* Check return value for ENGINE_ctrl and ENGINE_ctrl_cmd.doug2015-07-201-4/+15
* Check return value in openssl(1) s_socket.doug2015-07-201-3/+6
* Remove check that is never true.doug2015-07-201-3/+1
* Warn when rename() fails in openssl(1) apps.doug2015-07-201-8/+36
* Add VIS_DQ to escape double quotes. OK deraadt@ semarie@ reyk@millert2015-07-201-1/+3
* Remove OpenSSL engine RSAX.doug2015-07-1914-1409/+12
* Allow *_free() functions in libssl to handle NULL input.doug2015-07-199-9/+34
* Drop stupid (int) casts for the arguments of malloc() and friends. This ismiod2015-07-1918-48/+48
* unifdef -UCBC_HANDLES_TRUNCATED_IOmiod2015-07-192-38/+2
* Verify ASN1 objects types before attempting to access them as a particularmiod2015-07-194-4/+12
* tweak previous; ok dougjmc2015-07-191-4/+4
* Convert ssl3_get_certificate_request to CBS.doug2015-07-192-62/+66
* Fix symbol collision with libtls.doug2015-07-197-36/+36
* Add TLS_method, TLS_client_method and TLS_server_method.doug2015-07-199-9/+321
* Crank major and remove legacy variables.doug2015-07-196-30/+6
* Crank the major of libtls: the behaviour of tls_write() has beenreyk2015-07-191-1/+1
* Free memory when finished.doug2015-07-191-2/+6
* Add documentation on how to use TLS_{READ,WRITE}_AGAIN.doug2015-07-191-2/+29
* Now that it is safe to invoke X509_STORE_CTX_cleanup() if X509_STORE_CTX_init()miod2015-07-194-16/+32
* Only close descriptor if not already closed.doug2015-07-191-3/+5
* Free variable before potentially reusing.doug2015-07-191-1/+2
* Free passin on error.doug2015-07-191-4/+4
* Fix coverity 105339, by correctly checking return from strtollbeck2015-07-191-1/+1
* Put explicit braces around assignment used in a conditional.miod2015-07-192-4/+4
* Remove the logic responsible for outputting most AES-NI instructions asmiod2015-07-196-214/+0
* Replace `.byte 0x48,0x83,0xEC,0x08' with `sub \$8,%rsp' which is exactly themiod2015-07-192-4/+4
* Simplify X509_STORE_CTX_init and make it safe with stack variables.doug2015-07-192-116/+110
* Remove case that can never happen.doug2015-07-192-10/+2
* Fix Coverity 72742 - ret is overwritten immediately after this.beck2015-07-192-4/+2
* Remove effectively unused variable.doug2015-07-191-4/+1
* Assign p to CBS_data since it is used later.doug2015-07-192-4/+6
* abort when ENGINE_remove fails, fix Coverity 21656bcook2015-07-192-10/+4
* Convert dtls1_get_message_header to CBS and change to int.doug2015-07-186-32/+74
* rand_err doesn't exist anymore, coverity 78808beck2015-07-182-6/+6
* Coverity 21651beck2015-07-182-6/+14
* Convert dtls1_get_record to CBS.doug2015-07-182-42/+56
* Remove repeated code in dtls1_get_record.doug2015-07-182-80/+32
* Set SSL_MODE_ENABLE_PARTIAL_WRITE and SSL_MODE_ACCEPT_MOVING_WRITE_BUFFERbluhm2015-07-181-1/+4
* Dead code, Coverity 78798beck2015-07-182-6/+2
* simplify length checking in do_indefinite_convertbcook2015-07-181-11/+17
* Coverity ID 78910 - Yet another stupid API designed to not show failures. do thebeck2015-07-182-12/+16