| Commit message (Expand) | Author | Age | Files | Lines |
| ... | |
| * | Oops, revert changes commited by mistake. The previous commit was supposed | miod | 2014-08-07 | 13 | -53/+59 |
| * | When you expect a function to return a particular value, don't put a comment | miod | 2014-08-07 | 15 | -71/+59 |
| * | Fix CVE-2014-3511; TLS downgrade, verbatim diff | deraadt | 2014-08-07 | 2 | -10/+54 |
| * | merge CVE-2014-3510; Fix DTLS anonymous EC(DH) denial of service | deraadt | 2014-08-07 | 2 | -2/+18 |
| * | merge fix for CVE-2014-3509 -- basically a missing s->hit check; ok guenther | deraadt | 2014-08-06 | 2 | -18/+26 |
| * | Prevent a possible use after free by mimicing the s3_srvr.c fixes contributed by | miod | 2014-08-06 | 2 | -8/+2 |
| * | Allow B64_EOF to follow a base64 padding character. This restores previous | jsing | 2014-08-06 | 1 | -2/+3 |
| * | Correct error checks in EVP_read_pw_string_min(): UI_add_input_string() | guenther | 2014-08-06 | 1 | -3/+3 |
| * | In chacha_init(), allow for a NULL iv. Reported by znz on github. | miod | 2014-08-04 | 1 | -2/+3 |
| * | Fix a usage string; the proper spelling of 'alot' is 'a lot'. | blambert | 2014-07-29 | 1 | -2/+2 |
| * | Remove SRP code. It contains a bug (this should not surprise anyone), but | tedu | 2014-07-28 | 6 | -1816/+1 |
| * | The RSA, DH, and ECDH temporary key callbacks expect the number of keybits | guenther | 2014-07-28 | 6 | -18/+42 |
| * | Add missing year to copyright. | jsing | 2014-07-25 | 2 | -4/+4 |
| * | BIO_free() returns immediately when the sole input is NULL. | doug | 2014-07-25 | 19 | -71/+45 |
| * | level_add_node(): if a memory allocation failure causes us to attempt to clean | miod | 2014-07-23 | 1 | -4/+7 |
| * | Make sure PEM_def_callback() correctly handles negative buffer sizes; all uses | miod | 2014-07-23 | 1 | -10/+17 |
| * | Check the return value of the UI functions (including UI_new() which return | miod | 2014-07-23 | 1 | -6/+11 |
| * | Now that DES_random_key() can be trusted, use it to generate DES keys in the | miod | 2014-07-22 | 2 | -12/+10 |
| * | In DES_random_key(), force the generated key to the odd parity before checking | miod | 2014-07-22 | 1 | -8/+8 |
| * | Handle failure of NETSCAPE_SPKI_b64_encode() and don't leak memory | guenther | 2014-07-22 | 1 | -6/+10 |
| * | Kill a bunch more BUF_strdup's - these are converted to have a check for | beck | 2014-07-22 | 6 | -15/+20 |
| * | Mark the format string argument to BIO_*printf as not being allowed to be NULL | guenther | 2014-07-20 | 1 | -5/+7 |
| * | Fix strtonum range to unbreak -pass fd:0 | lteo | 2014-07-19 | 1 | -2/+2 |
| * | missing newline | deraadt | 2014-07-18 | 1 | -2/+2 |
| * | avoid errx(); Jonas Termansen | deraadt | 2014-07-17 | 1 | -3/+5 |
| * | avoid sys/param.h; Jonas Termansen | deraadt | 2014-07-17 | 3 | -7/+8 |
| * | Missing bounds check in ssl3_get_certificate_request(), was not spotted in | miod | 2014-07-17 | 2 | -2/+12 |
| * | Free sktmp when it's no longer needed. By doing so, we fix a bunch of memory ... | logan | 2014-07-17 | 1 | -2/+4 |
| * | do not need a variable to track locking, since all code paths have it | deraadt | 2014-07-16 | 1 | -5/+2 |
| * | not needed anymore | deraadt | 2014-07-14 | 2 | -1173/+0 |
| * | Fix memory leak upon error in ssl_parse_clienthello_use_srtp_ext(). | miod | 2014-07-14 | 2 | -12/+12 |
| * | whitespace | deraadt | 2014-07-14 | 45 | -172/+172 |
| * | Improve RAND_write_file(), chmod crud, etc. | deraadt | 2014-07-14 | 1 | -27/+19 |
| * | Stop leaking internal library pointers in error messages. | jsing | 2014-07-13 | 2 | -4/+4 |
| * | Explicitly initialise slen - this was not previously done due to a missing | jsing | 2014-07-13 | 2 | -2/+4 |
| * | Convert error handling to SSLerr and ERR_asprintf_error_data. | jsing | 2014-07-13 | 2 | -118/+108 |
| * | Convert d2i_SSL_SESSION to ASN1 primitives, instead of the horrific | jsing | 2014-07-13 | 2 | -52/+594 |
| * | Remove license introduced with the PSK code, which has since been removed. | jsing | 2014-07-13 | 2 | -54/+2 |
| * | Another compression remnant. | jsing | 2014-07-13 | 2 | -4/+2 |
| * | Expand the tlsext_sigalg macros. The end result is about the same number | jsing | 2014-07-13 | 2 | -32/+38 |
| * | Rewrite i2d_SSL_SESSION to use the ASN1 primitives, rather than using the | jsing | 2014-07-13 | 2 | -150/+196 |
| * | The bell tolls for BUF_strdup - Start the migration to using | beck | 2014-07-13 | 25 | -85/+92 |
| * | Fix memory leak. | logan | 2014-07-13 | 1 | -1/+2 |
| * | OPENSSL_{malloc,free} -> {malloc,free} | miod | 2014-07-13 | 11 | -15/+15 |
| * | Warn about the use of BUF_strdup. | miod | 2014-07-13 | 1 | -2/+4 |
| * | unbreak build this needed to be an and.. | beck | 2014-07-13 | 4 | -8/+8 |
| * | Make sure all error conditions in RSA_padding_add_PKCS1_PSS_mgf1() cause | miod | 2014-07-13 | 1 | -3/+4 |
| * | Possible PBEPARAM leak in the error path. | miod | 2014-07-13 | 1 | -6/+8 |
| * | dsa_priv_decode(): only destroy the object we've created, and with the | miod | 2014-07-13 | 1 | -3/+5 |
| * | Check X509_NAME_oneline() return value when it will have to allocate memory. | miod | 2014-07-13 | 1 | -1/+3 |