summaryrefslogtreecommitdiff
path: root/src/lib (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Make sure stdio functions don't end up in the library, from miod@beck2016-03-067-15/+39
* graduate bn_expand() to a real function. the openssl version of thisderaadt2016-03-044-8/+32
* Revert bn_expand until there's consensus on a fix.doug2016-03-042-28/+6
* fix the rest of the read_ledword() calls used as lengths to be bounded.beck2016-03-022-2/+10
* Add bounds checking for BN_hex2bn/BN_dec2bn.doug2016-03-024-20/+52
* bound lengths coming out of a pem file to something like realitybeck2016-03-022-6/+14
* Remove support for ancient, broken DSA implementations.doug2016-03-012-120/+40
* remove NULL checks for pqueue_free()mmcc2016-02-292-22/+12
* refactor option letter parsing into a subfunction, to increase clarityderaadt2016-02-251-93/+102
* Sync some root certificates with Mozilla's cert store. ok bcook@sthen2016-02-171-84/+1016
* compare pointer to NULL in example codemmcc2016-02-071-3/+3
* be more forceful about not using these.espie2016-02-051-2/+9
* Fix err(3) calls after allocation failures in examples.schwarze2016-02-051-8/+8
* Sort cert.pem alphabetically, first by organisation, then by CA namesthen2016-02-011-1604/+1584
* Revamp cert.pem certificate information formatting. Skip headers whichsthen2016-01-311-2459/+184
* Therefor -> Therefore (where appropriate)tb2016-01-292-2/+2
* deprecate SSL_OP_SINGLE_DH_USElibressl-v2.3.2beck2016-01-274-74/+12
* Don't crash dumping malloc stats if malloc_init hasn't been called, noted byotto2016-01-261-1/+3
* Call BIO_sock_init() from tls_init() to ensure sockets are enabled on Windows.bcook2016-01-181-1/+4
* Long ago, malloc internally had two kinds of failures, warnings and errors.tedu2016-01-062-14/+7
* Follow style(9) and drop lint /* NOTREACHED */ annotations fromtb2016-01-042-6/+4
* Calling clone(2) with CLONE_NEWPID yields multiple processes with pid=1.bcook2016-01-042-4/+6
* Document that the ssl free() functions are NULL safe. OK mmcc@millert2015-12-306-12/+42
* another case where bad things would happen after wrterrortedu2015-12-301-2/+4
* if somebody makes the mistake of disabling abort, don't deref null intedu2015-12-301-2/+4
* Remove NULL-checks before free() and a few related dead assignments.mmcc2015-12-282-8/+5
* remove unused variablechl2015-12-271-2/+1
* More adress -> addressmmcc2015-12-244-4/+4
* remove NULL-checks before free()mmcc2015-12-236-38/+22
* assign pointer NULL rather than 0mmcc2015-12-232-4/+4
* assign pointer to NULL rather than 0mmcc2015-12-232-4/+4
* initialize a pointer to NULL rather than 0mmcc2015-12-222-4/+4
* gethostbyname2() and gethostbyaddr() need <sys/socket.h>; discussed withtim2015-12-191-6/+8
* Simplify return call of rand() and rand_r() to make it easier to read.tb2015-12-181-2/+2
* tweak previous;jmc2015-12-162-4/+5
* Remove support for HOSTALIASES from the resolver. This "open and parsederaadt2015-12-162-15/+6
* Remove "C=US, O=VeriSign, Inc., OU=Class 3 Public Primary Certificationsthen2015-12-151-49/+0
* initialize ext_len to 0.beck2015-12-142-4/+12
* initialize ok to 0beck2015-12-142-4/+4
* initialize md_len to 0 for readability to quell warnings.beck2015-12-142-6/+6
* s/begining/beginning/gmmcc2015-12-141-2/+2
* decipher comment. ok bcook@mmcc2015-12-122-4/+4
* move initialization of buf up to quell warnings and make it obvious the err c...beck2015-12-122-8/+10
* prevent possibly use of uninitialized variablebeck2015-12-122-4/+4
* make the counter a size_t as well, which quells a warning on visual studio 2015beck2015-12-122-4/+6
* tiny sanity check on file sizetedu2015-12-101-1/+3
* bump the major for libcrypto/ssl/tls for a CRYPTO_chacha_20 ABI changebcook2015-12-095-10/+10
* Change the counter argument for CRYPTO_chacha_20 to be 64-bits on all platforms.bcook2015-12-094-10/+12
* Integrate two patches originally from Daniel Micay.tedu2015-12-091-8/+76
* Add root certificate for COMODO RSA Certification Authority, ok beck@sthen2015-12-071-0/+122