summaryrefslogtreecommitdiff
path: root/src/lib/libssl/d1_both.c (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Remove support for DTLS_BAD_VER. We do not support non-standard andjsing2015-09-101-13/+5
* Allow *_free() functions in libssl to handle NULL input.doug2015-07-191-1/+3
* Convert dtls1_get_message_header to CBS and change to int.doug2015-07-181-12/+32
* Jettison DTLS over SCTP.jsing2015-02-091-16/+1
* Provide functions for starting, finishing and writing SSL handshakejsing2014-12-141-1/+3
* Sort and group includes.jsing2014-11-161-3/+5
* Use arc4random_buf() instead of RAND_bytes() or RAND_pseudo_bytes().jsing2014-10-181-2/+1
* Fix CVE-2014-3507, avoid allocating and then leaking a fresh fragmentguenther2014-08-081-2/+7
* Fix CVE-2014-3506, DTLS handshake message size checks. Fromguenther2014-08-071-16/+22
* Oops, revert changes commited by mistake. The previous commit was supposedmiod2014-08-071-2/+3
* When you expect a function to return a particular value, don't put a commentmiod2014-08-071-3/+2
* decompress libssl. ok beck jsingtedu2014-07-101-6/+1
* KNF comments, reflowing and moving out of the middle of argument lists inguenther2014-07-101-45/+84
* Memory leak in error path of the day, from clang via dhill@bitrig;miod2014-07-021-2/+3
* tags as requested by miod and teduderaadt2014-06-121-1/+1
* Do not recurse when a 'Hello Request' message is received while gettingjsing2014-06-051-1/+2
* Avoid a buffer overflow that can be triggered by sending specially craftedjsing2014-06-051-1/+7
* BUF_MEM_grow_clean() takes a size_t as the size argument. Remove false commentsmiod2014-05-311-1/+1
* remove some #if 0 code. we don't need any more reminders that we're usingtedu2014-05-301-49/+0
* There is no point in checking if a pointer is non-NULL before calling free,jsing2014-05-281-6/+3
* Stop pulling pqueue.h into ssl_locl.h since only a small part of libssljsing2014-05-221-0/+2
* In dtls1_reassemble_fragment() and dtls1_process_out_of_seq_message(), in casemiod2014-05-181-7/+3
* Avoid a potential null pointer dereference by checking that we actuallyjsing2014-04-301-0/+2
* More KNF.jsing2014-04-241-92/+122
* more malloc/realloc/calloc cleanups; ok beck kettenisderaadt2014-04-211-3/+3
* Change library to use intrinsic memory allocation functions instead ofbeck2014-04-171-12/+12
* fix a few bugs observed on http://www.viva64.com/en/b/0250/tedu2014-04-161-1/+0
* correct cases of code occuring directly after goto/break/returnjsg2014-04-151-1/+1
* make OPENSSL_NO_HEARTBLEED the default and only option. ok deraadt miodtedu2014-04-141-153/+0
* First pass at applying KNF to the OpenSSL code, which almost makes itjsing2014-04-141-565/+501
* Flense a variety of windows support stuff, and a strange gettimeofday function.beck2014-04-131-7/+0
* Merge conflicts; remove MacOS, Netware, OS/2, VMS and Windows build machinery.miod2014-04-131-4/+4
* cherrypick fix for CVE-2014-0160 "heartbleed" vulnerability fromdjm2014-04-071-8/+18
* SECURITY fixes backported from openssl-1.0.1f. ok mikeb@jca2014-02-271-0/+7
* import OpenSSL-1.0.1cdjm2012-10-131-3/+175
* OpenSSL 1.0.0f: import upstream sourcedjm2012-01-051-7/+16
* import OpenSSL 1.0.0edjm2011-11-031-18/+10
* import OpenSSL-1.0.0adjm2010-10-011-201/+426
* import of OpenSSL 0.9.8hdjm2008-09-061-0/+1193