| Commit message (Expand) | Author | Age | Files | Lines |
| * | Check the return value of asn1_enc_save(). ok bcook@ doug@ | miod | 2015-07-20 | 1 | -2/+4 |
| * | When freeing an X509_CRL, if freeing the user-maintained meth_data fails, | miod | 2015-07-20 | 1 | -3/+4 |
| * | In X509_PKEY_new(), make sure all allocation failures push an error to the | miod | 2015-07-20 | 1 | -7/+15 |
| * | Remove OpenSSL engine RSAX. | doug | 2015-07-19 | 6 | -703/+5 |
| * | Allow *_free() functions in libssl to handle NULL input. | doug | 2015-07-19 | 9 | -9/+34 |
| * | Drop stupid (int) casts for the arguments of malloc() and friends. This is | miod | 2015-07-19 | 9 | -24/+24 |
| * | unifdef -UCBC_HANDLES_TRUNCATED_IO | miod | 2015-07-19 | 1 | -19/+1 |
| * | Verify ASN1 objects types before attempting to access them as a particular | miod | 2015-07-19 | 2 | -2/+6 |
| * | Convert ssl3_get_certificate_request to CBS. | doug | 2015-07-19 | 2 | -62/+66 |
| * | Fix symbol collision with libtls. | doug | 2015-07-19 | 7 | -36/+36 |
| * | Add TLS_method, TLS_client_method and TLS_server_method. | doug | 2015-07-19 | 9 | -9/+321 |
| * | Crank major and remove legacy variables. | doug | 2015-07-19 | 6 | -30/+6 |
| * | Now that it is safe to invoke X509_STORE_CTX_cleanup() if X509_STORE_CTX_init() | miod | 2015-07-19 | 2 | -8/+16 |
| * | Put explicit braces around assignment used in a conditional. | miod | 2015-07-19 | 1 | -2/+2 |
| * | Remove the logic responsible for outputting most AES-NI instructions as | miod | 2015-07-19 | 3 | -107/+0 |
| * | Replace `.byte 0x48,0x83,0xEC,0x08' with `sub \$8,%rsp' which is exactly the | miod | 2015-07-19 | 1 | -2/+2 |
| * | Simplify X509_STORE_CTX_init and make it safe with stack variables. | doug | 2015-07-19 | 1 | -58/+55 |
| * | Remove case that can never happen. | doug | 2015-07-19 | 1 | -5/+1 |
| * | Fix Coverity 72742 - ret is overwritten immediately after this. | beck | 2015-07-19 | 1 | -2/+1 |
| * | Assign p to CBS_data since it is used later. | doug | 2015-07-19 | 2 | -4/+6 |
| * | abort when ENGINE_remove fails, fix Coverity 21656 | bcook | 2015-07-19 | 1 | -5/+2 |
| * | Convert dtls1_get_message_header to CBS and change to int. | doug | 2015-07-18 | 6 | -32/+74 |
| * | rand_err doesn't exist anymore, coverity 78808 | beck | 2015-07-18 | 1 | -3/+3 |
| * | Coverity 21651 | beck | 2015-07-18 | 1 | -3/+7 |
| * | Convert dtls1_get_record to CBS. | doug | 2015-07-18 | 2 | -42/+56 |
| * | Remove repeated code in dtls1_get_record. | doug | 2015-07-18 | 2 | -80/+32 |
| * | Dead code, Coverity 78798 | beck | 2015-07-18 | 1 | -3/+1 |
| * | Coverity ID 78910 - Yet another stupid API designed to not show failures. do the | beck | 2015-07-18 | 1 | -6/+8 |
| * | Remove SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER workaround. | doug | 2015-07-18 | 10 | -58/+26 |
| * | Check the return value of ASN1_STRING_set(), for it may fail to allocate | miod | 2015-07-18 | 2 | -6/+14 |
| * | Remove support for the SSL_OP_TLS_D5_BUG compat hack from SSLeay. | doug | 2015-07-18 | 6 | -28/+22 |
| * | Fix leak found by coverity, issue 78897 - which also brough to | beck | 2015-07-18 | 3 | -25/+33 |
| * | delete doubled words; | schwarze | 2015-07-17 | 4 | -4/+4 |
| * | extenstion -> extension | miod | 2015-07-17 | 1 | -1/+1 |
| * | Convert ssl_parse_serverhello_use_srtp_ext to CBS. | doug | 2015-07-17 | 4 | -24/+34 |
| * | Remove compat hack that disabled ECDHE-ECDSA on OS X. | doug | 2015-07-17 | 10 | -208/+26 |
| * | Remove workaround for TLS padding bug from SSLeay days. | doug | 2015-07-17 | 12 | -74/+24 |
| * | Bump LIBRESSL_VERSION defines. | bcook | 2015-07-16 | 1 | -3/+7 |
| * | Enforce V_ASN1_OCTET_STRING type before accessing the object as octet string; | miod | 2015-07-16 | 1 | -2/+4 |
| * | After reading a password with terminal echo off, restore the terminal to | guenther | 2015-07-16 | 1 | -6/+5 |
| * | Explicitely cast a char into unsigned long before shifting it left by 24, for | miod | 2015-07-16 | 1 | -2/+2 |
| * | Check return value of all used functions in OCSP_REQUEST_print(); covers | miod | 2015-07-16 | 1 | -5/+9 |
| * | Make sure the `reject negative sizes' logic introduced in 1.34 is actually | miod | 2015-07-16 | 1 | -3/+4 |
| * | check n before cbs_init, coverity - ID 125063 | beck | 2015-07-15 | 2 | -6/+18 |
| * | test for n<0 before use in CBS_init - mostly to shut up coverity. | beck | 2015-07-15 | 6 | -22/+66 |
| * | Flense out dead code, we don't do ecdhe_clnt_cert. | beck | 2015-07-15 | 4 | -374/+150 |
| * | Fix inverted test in previous. Commit message told what we intended, but | miod | 2015-07-15 | 1 | -2/+2 |
| * | Remove dead code. Coverity CID 21688 | miod | 2015-07-15 | 1 | -4/+1 |
| * | Fix two theoretical NULL pointer dereferences which can only happen if you | miod | 2015-07-15 | 1 | -4/+9 |
| * | Fix possible 32 byte buffer overrun, found by coverity, CID 78869 | beck | 2015-07-15 | 1 | -2/+2 |