summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
...
* Only close descriptor if not already closed.doug2015-07-191-3/+5
* Free variable before potentially reusing.doug2015-07-191-1/+2
* Free passin on error.doug2015-07-191-4/+4
* Fix coverity 105339, by correctly checking return from strtollbeck2015-07-191-1/+1
* Put explicit braces around assignment used in a conditional.miod2015-07-192-4/+4
* Remove the logic responsible for outputting most AES-NI instructions asmiod2015-07-196-214/+0
* Replace `.byte 0x48,0x83,0xEC,0x08' with `sub \$8,%rsp' which is exactly themiod2015-07-192-4/+4
* Simplify X509_STORE_CTX_init and make it safe with stack variables.doug2015-07-192-116/+110
* Remove case that can never happen.doug2015-07-192-10/+2
* Fix Coverity 72742 - ret is overwritten immediately after this.beck2015-07-192-4/+2
* Remove effectively unused variable.doug2015-07-191-4/+1
* Assign p to CBS_data since it is used later.doug2015-07-192-4/+6
* abort when ENGINE_remove fails, fix Coverity 21656bcook2015-07-192-10/+4
* Convert dtls1_get_message_header to CBS and change to int.doug2015-07-186-32/+74
* rand_err doesn't exist anymore, coverity 78808beck2015-07-182-6/+6
* Coverity 21651beck2015-07-182-6/+14
* Convert dtls1_get_record to CBS.doug2015-07-182-42/+56
* Remove repeated code in dtls1_get_record.doug2015-07-182-80/+32
* Set SSL_MODE_ENABLE_PARTIAL_WRITE and SSL_MODE_ACCEPT_MOVING_WRITE_BUFFERbluhm2015-07-181-1/+4
* Dead code, Coverity 78798beck2015-07-182-6/+2
* simplify length checking in do_indefinite_convertbcook2015-07-181-11/+17
* Coverity ID 78910 - Yet another stupid API designed to not show failures. do thebeck2015-07-182-12/+16
* Remove SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER workaround.doug2015-07-1810-58/+26
* remove mysterious, decorative comment blockletsbcook2015-07-181-21/+21
* Explicitly mark ignored BN_* return vals in tests.bcook2015-07-181-6/+6
* check sscanf conversion, fixes Coverity 21666bcook2015-07-181-2/+6
* Check the return value of ASN1_STRING_set(), for it may fail to allocatemiod2015-07-184-12/+28
* Remove support for the SSL_OP_TLS_D5_BUG compat hack from SSLeay.doug2015-07-186-28/+22
* Unbreak, add errno headerjeremy2015-07-181-1/+2
* set errno in null cases, just in case.tedu2015-07-181-2/+3
* standards compliant error return (null). will make ruby happier, at least.tedu2015-07-181-5/+2
* Fix leak found by coverity, issue 78897 - which also brough tobeck2015-07-186-50/+66
* delete doubled words;schwarze2015-07-178-8/+8
* extenstion -> extensionmiod2015-07-172-2/+2
* fix leak, found by coverity, ID 78877beck2015-07-171-3/+3
* Convert ssl_parse_serverhello_use_srtp_ext to CBS.doug2015-07-174-24/+34
* Remove SSLv3 support from openssl(1) s_time.doug2015-07-171-13/+3
* Remove SSLv3 support from openssl(1) s_server.doug2015-07-171-7/+2
* Remove SSLv3 support from openssl(1) s_client.doug2015-07-171-4/+1
* Remove support for SSLv3 from openssl(1) ciphers.doug2015-07-171-27/+5
* Remove compat hack that disabled ECDHE-ECDSA on OS X.doug2015-07-1710-208/+26
* Remove workaround for TLS padding bug from SSLeay days.doug2015-07-1713-79/+25
* Bump LIBRESSL_VERSION defines.bcook2015-07-162-6/+14
* Enforce V_ASN1_OCTET_STRING type before accessing the object as octet string;miod2015-07-162-4/+8
* fix coverity leak - ID 78921beck2015-07-161-3/+11
* kill leak, found by coverity, ID 105348beck2015-07-161-2/+5
* After reading a password with terminal echo off, restore the terminal toguenther2015-07-162-12/+10
* Explicitely cast a char into unsigned long before shifting it left by 24, formiod2015-07-162-4/+4
* Check return value of all used functions in OCSP_REQUEST_print(); coversmiod2015-07-162-10/+18
* Make sure the `reject negative sizes' logic introduced in 1.34 is actuallymiod2015-07-162-6/+8