| Commit message (Expand) | Author | Age | Files | Lines |
... | |
* | Expand another wall of ASN.1 template macros - no change to generated | jsing | 2015-07-25 | 1 | -224/+1357 |
* | Expand ASN.1 template macros - no change in generated assembly. | jsing | 2015-07-25 | 2 | -136/+847 |
* | Expand ASN.1 template macros - the generated assembly only differs by | jsing | 2015-07-25 | 1 | -55/+351 |
* | Expand ASN.1 template macros - no change in generated assembly. | jsing | 2015-07-24 | 2 | -27/+171 |
* | Expand ASN.1 template macros - the generated assembly only differs by | jsing | 2015-07-24 | 1 | -51/+341 |
* | an TLS -> a TLS; from thanos tsouanas | jmc | 2015-07-24 | 1 | -2/+2 |
* | Expand ASN1_ITEM_TEMPLATE/ASN1_EX_TEMPLATE_TYPE/ASN1_ITEM_TEMPLATE_END | jsing | 2015-07-24 | 4 | -22/+106 |
* | Expand IMPLEMENT_ASN1_MSTRING macros - the generated assembly only differs | jsing | 2015-07-24 | 2 | -6/+42 |
* | Correct #if/else logic in BIO's dgram_ctrl. | doug | 2015-07-20 | 1 | -3/+3 |
* | prefer string.h to strings.h ok guenther@ doug@ | bcook | 2015-07-20 | 1 | -2/+2 |
* | Various memory leaks upon error or unchecked allocations. | miod | 2015-07-20 | 1 | -4/+13 |
* | Use V_ASN1_UNDEF instead of -1. | miod | 2015-07-20 | 1 | -7/+7 |
* | Check the return value of asn1_enc_save(). ok bcook@ doug@ | miod | 2015-07-20 | 1 | -2/+4 |
* | When freeing an X509_CRL, if freeing the user-maintained meth_data fails, | miod | 2015-07-20 | 1 | -3/+4 |
* | In X509_PKEY_new(), make sure all allocation failures push an error to the | miod | 2015-07-20 | 1 | -7/+15 |
* | add NetLock Kft. CA root certificate, already present in web browsers and | steven | 2015-07-20 | 1 | -0/+80 |
* | Remove OpenSSL engine RSAX. | doug | 2015-07-19 | 7 | -705/+6 |
* | Drop stupid (int) casts for the arguments of malloc() and friends. This is | miod | 2015-07-19 | 9 | -24/+24 |
* | unifdef -UCBC_HANDLES_TRUNCATED_IO | miod | 2015-07-19 | 1 | -19/+1 |
* | Verify ASN1 objects types before attempting to access them as a particular | miod | 2015-07-19 | 2 | -2/+6 |
* | Now that it is safe to invoke X509_STORE_CTX_cleanup() if X509_STORE_CTX_init() | miod | 2015-07-19 | 2 | -8/+16 |
* | Put explicit braces around assignment used in a conditional. | miod | 2015-07-19 | 1 | -2/+2 |
* | Remove the logic responsible for outputting most AES-NI instructions as | miod | 2015-07-19 | 3 | -107/+0 |
* | Replace `.byte 0x48,0x83,0xEC,0x08' with `sub \$8,%rsp' which is exactly the | miod | 2015-07-19 | 1 | -2/+2 |
* | Simplify X509_STORE_CTX_init and make it safe with stack variables. | doug | 2015-07-19 | 1 | -58/+55 |
* | Remove case that can never happen. | doug | 2015-07-19 | 1 | -5/+1 |
* | Fix Coverity 72742 - ret is overwritten immediately after this. | beck | 2015-07-19 | 1 | -2/+1 |
* | abort when ENGINE_remove fails, fix Coverity 21656 | bcook | 2015-07-19 | 1 | -5/+2 |
* | rand_err doesn't exist anymore, coverity 78808 | beck | 2015-07-18 | 1 | -3/+3 |
* | Coverity 21651 | beck | 2015-07-18 | 1 | -3/+7 |
* | Dead code, Coverity 78798 | beck | 2015-07-18 | 1 | -3/+1 |
* | Coverity ID 78910 - Yet another stupid API designed to not show failures. do the | beck | 2015-07-18 | 1 | -6/+8 |
* | Check the return value of ASN1_STRING_set(), for it may fail to allocate | miod | 2015-07-18 | 2 | -6/+14 |
* | Fix leak found by coverity, issue 78897 - which also brough to | beck | 2015-07-18 | 3 | -25/+33 |
* | delete doubled words; | schwarze | 2015-07-17 | 4 | -4/+4 |
* | extenstion -> extension | miod | 2015-07-17 | 1 | -1/+1 |
* | Bump LIBRESSL_VERSION defines. | bcook | 2015-07-16 | 1 | -3/+7 |
* | Enforce V_ASN1_OCTET_STRING type before accessing the object as octet string; | miod | 2015-07-16 | 1 | -2/+4 |
* | After reading a password with terminal echo off, restore the terminal to | guenther | 2015-07-16 | 1 | -6/+5 |
* | Explicitely cast a char into unsigned long before shifting it left by 24, for | miod | 2015-07-16 | 1 | -2/+2 |
* | Check return value of all used functions in OCSP_REQUEST_print(); covers | miod | 2015-07-16 | 1 | -5/+9 |
* | Make sure the `reject negative sizes' logic introduced in 1.34 is actually | miod | 2015-07-16 | 1 | -3/+4 |
* | Fix inverted test in previous. Commit message told what we intended, but | miod | 2015-07-15 | 1 | -2/+2 |
* | Remove dead code. Coverity CID 21688 | miod | 2015-07-15 | 1 | -4/+1 |
* | Fix two theoretical NULL pointer dereferences which can only happen if you | miod | 2015-07-15 | 1 | -4/+9 |
* | Fix possible 32 byte buffer overrun, found by coverity, CID 78869 | beck | 2015-07-15 | 1 | -2/+2 |
* | Memory leak; Coverity CID 78836 | miod | 2015-07-15 | 1 | -6/+8 |
* | Unchecked allocations, and make sure we do not leak upon error. Fixes | miod | 2015-07-15 | 1 | -21/+36 |
* | Avoid leaking objects upon error; tweaks & ok doug@ | miod | 2015-07-15 | 1 | -18/+18 |
* | Do not allow TS_check_signer_name() with signer == NULL from | miod | 2015-07-15 | 1 | -1/+4 |