summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
* Check the return value of ASN1_STRING_set(), for it may fail to allocatemiod2015-07-182-6/+14
* Remove support for the SSL_OP_TLS_D5_BUG compat hack from SSLeay.doug2015-07-186-28/+22
* Fix leak found by coverity, issue 78897 - which also brough tobeck2015-07-183-25/+33
* delete doubled words;schwarze2015-07-174-4/+4
* extenstion -> extensionmiod2015-07-171-1/+1
* Convert ssl_parse_serverhello_use_srtp_ext to CBS.doug2015-07-174-24/+34
* Remove compat hack that disabled ECDHE-ECDSA on OS X.doug2015-07-1710-208/+26
* Remove workaround for TLS padding bug from SSLeay days.doug2015-07-1712-74/+24
* Bump LIBRESSL_VERSION defines.bcook2015-07-161-3/+7
* Enforce V_ASN1_OCTET_STRING type before accessing the object as octet string;miod2015-07-161-2/+4
* After reading a password with terminal echo off, restore the terminal toguenther2015-07-161-6/+5
* Explicitely cast a char into unsigned long before shifting it left by 24, formiod2015-07-161-2/+2
* Check return value of all used functions in OCSP_REQUEST_print(); coversmiod2015-07-161-5/+9
* Make sure the `reject negative sizes' logic introduced in 1.34 is actuallymiod2015-07-161-3/+4
* check n before cbs_init, coverity - ID 125063beck2015-07-152-6/+18
* test for n<0 before use in CBS_init - mostly to shut up coverity.beck2015-07-156-22/+66
* Flense out dead code, we don't do ecdhe_clnt_cert.beck2015-07-154-374/+150
* Fix inverted test in previous. Commit message told what we intended, butmiod2015-07-151-2/+2
* Remove dead code. Coverity CID 21688miod2015-07-151-4/+1
* Fix two theoretical NULL pointer dereferences which can only happen if youmiod2015-07-151-4/+9
* Fix possible 32 byte buffer overrun, found by coverity, CID 78869beck2015-07-151-2/+2
* Memory leak; Coverity CID 78836miod2015-07-151-6/+8
* Unchecked allocations, and make sure we do not leak upon error. Fixesmiod2015-07-151-21/+36
* Avoid leaking objects upon error; tweaks & ok doug@miod2015-07-151-18/+18
* Do not allow TS_check_signer_name() with signer == NULL frommiod2015-07-151-1/+4
* Previous fix for Coverity CID 21785 did not cope correctly with seed_len != 0,miod2015-07-151-1/+3
* Partially convert ssl3_get_message to CBS.doug2015-07-142-12/+30
* Convert dtls1_get_hello_verify to CBS.doug2015-07-142-34/+46
* Convert ssl3_get_cipher_by_char to CBS.doug2015-07-142-4/+16
* Convert ssl3_get_client_certificate to CBS.doug2015-07-142-30/+38
* Convert ssl3_get_finished to CBS.doug2015-07-142-12/+18
* Convert ssl_parse_clienthello_use_srtp_ext to CBS.doug2015-07-144-84/+50
* Convert ssl3_get_cert_status to CBS.doug2015-07-142-34/+52
* Convert ssl3_get_server_certificate to CBS.doug2015-07-142-34/+36
* fix the build on arm after the recent addition of -Wundefjsg2015-06-291-2/+2
* Convert ssl_bytes_to_cipher_list to CBS.doug2015-06-284-20/+40
* Fix pointer to unsigned long conversion.doug2015-06-272-5/+7
* Put BUF_memdup() and BUF_reverse() under #ifndef LIBRESSL_INTERNAL.jsing2015-06-241-3/+2
* Stop using BUF_memdup() within the LibreSSL code base - it is correctlyjsing2015-06-244-12/+14
* Change CBS_dup() to also sync the offset.doug2015-06-232-2/+4
* Check for failure with CBB_init() in bs_ber.c.doug2015-06-212-4/+6
* Convert ssl3_get_new_session_ticket to CBS.doug2015-06-202-48/+48
* Convert ssl3_get_next_proto to CBS.doug2015-06-202-28/+38
* Convert ssl_parse_serverhello_renegotiate_ext to CBS.doug2015-06-204-38/+42
* Handle NIST curve names.jsing2015-06-201-2/+4
* Have ECPKParameters_print() include the NIST curve name, if known.jsing2015-06-201-1/+10
* Provide EC_curve_nid2nist() and EC_curve_nist2nid().jsing2015-06-202-2/+57
* Make SSL_OP_ALL readable.jsing2015-06-202-4/+18
* Put CRYPTO_memcmp() under #ifndef LIBRESSL_INTERNAL.jsing2015-06-201-1/+3
* Replace remaining CRYPTO_memcmp() calls with timingsafe_memcmp().jsing2015-06-203-6/+6