summaryrefslogtreecommitdiff
path: root/src/lib/libc/stdlib/merge.c (unfollow)
Commit message (Expand)AuthorFilesLines
2015-07-16Explicitely cast a char into unsigned long before shifting it left by 24, formiod2-4/+4
2015-07-16Check return value of all used functions in OCSP_REQUEST_print(); coversmiod2-10/+18
2015-07-16Make sure the `reject negative sizes' logic introduced in 1.34 is actuallymiod2-6/+8
2015-07-15check n before cbs_init, coverity - ID 125063beck2-6/+18
2015-07-15test for n<0 before use in CBS_init - mostly to shut up coverity.beck6-22/+66
2015-07-15Flense out dead code, we don't do ecdhe_clnt_cert.beck4-374/+150
2015-07-15Fix inverted test in previous. Commit message told what we intended, butmiod2-4/+4
2015-07-15Remove dead code. Coverity CID 21688miod2-8/+2
2015-07-15Fix two theoretical NULL pointer dereferences which can only happen if youmiod2-8/+18
2015-07-15Fix possible 32 byte buffer overrun, found by coverity, CID 78869beck2-4/+4
2015-07-15Memory leak; Coverity CID 78836miod2-12/+16
2015-07-15Unchecked allocations, and make sure we do not leak upon error. Fixesmiod2-42/+72
2015-07-15Avoid leaking objects upon error; tweaks & ok doug@miod2-36/+36
2015-07-15Do not allow TS_check_signer_name() with signer == NULL frommiod2-2/+8
2015-07-15Previous fix for Coverity CID 21785 did not cope correctly with seed_len != 0,miod2-2/+6
2015-07-15Add OPTION_ARG_LONG for handling of options with a long type.jsing2-3/+16
2015-07-15Make 'openssl pkeyutl -verify' return exit code 0 on success.bcook1-4/+5
2015-07-14Partially convert ssl3_get_message to CBS.doug2-12/+30
2015-07-14Convert dtls1_get_hello_verify to CBS.doug2-34/+46
2015-07-14Convert ssl3_get_cipher_by_char to CBS.doug2-4/+16
2015-07-14Convert ssl3_get_client_certificate to CBS.doug2-30/+38
2015-07-14Convert ssl3_get_finished to CBS.doug2-12/+18
2015-07-14Convert ssl_parse_clienthello_use_srtp_ext to CBS.doug4-84/+50
2015-07-14Convert ssl3_get_cert_status to CBS.doug2-34/+52
2015-07-14Convert ssl3_get_server_certificate to CBS.doug2-34/+36
2015-07-13Unhook tls_ext_alpn test until the code passes it.doug1-2/+5
2015-07-12Convert openssl(1) dh to the new option handling.doug1-98/+111
2015-07-12Convert openssl(1) dsa to the new option handling.doug1-154/+208
2015-07-12Convert openssl(1) ec to the new option handling.doug1-170/+247
2015-07-12Convert gendh.c to the new option handling.doug1-54/+79
2015-07-12Convert openssl(1) dsaparam to the new option handling.doug1-154/+123
2015-07-12Convert openssl(1) crl2pkcs7 to the new option handling.doug1-95/+110
2015-07-11Convert openssl(1) dhparam to new option handling.jsing1-121/+160
2015-07-09Add tests for parsing TLS extension ALPN (RFC 7301).doug2-2/+446
2015-07-08switch "openssl dhparam" default from 512 to 2048 bits, ok jsing@sthen2-6/+6
2015-07-07add setlocale testsemarie1-1/+3
2015-07-07add regress test for setlocale(3) and some relatedsemarie2-0/+140
2015-07-03Repair algorithm name array after 1.6.miod1-4/+4
2015-07-01specify the array initializer valuelibressl-v2.2.1bcook1-2/+2
2015-06-29fix the build on arm after the recent addition of -Wundefjsg2-4/+4
2015-06-28Convert ssl_bytes_to_cipher_list to CBS.doug6-23/+59
2015-06-27Add unit tests for LibreSSL.doug3-0/+256
2015-06-27Fix pointer to unsigned long conversion.doug4-10/+14
2015-06-24Put BUF_memdup() and BUF_reverse() under #ifndef LIBRESSL_INTERNAL.jsing2-6/+4
2015-06-24Stop using BUF_memdup() within the LibreSSL code base - it is correctlyjsing4-12/+14
2015-06-23Change CBS_dup() to also sync the offset.doug3-3/+41
2015-06-23Convert bytestringtest to individual checks and don't short circuit.doug1-321/+337
2015-06-23Remove unnecessary regress target.doug1-7/+2
2015-06-21Check for failure with CBB_init() in bs_ber.c.doug2-4/+6
2015-06-21Just return if nmemb is 0. Avoids a NULL dereference and ismillert1-1/+4