summaryrefslogtreecommitdiff
path: root/src/lib (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Cleanup more of tls_decrypt_ticket().jsing2019-04-211-5/+9
* Start cleaning up tls_decrypt_ticket().jsing2019-04-211-58/+63
* fix some style nits to reduce noise in an upcoming difftb2019-04-211-9/+8
* Avoid undefined behaviour that results from negating a signed long withjsing2019-04-201-2/+2
* Allocate md_data with calloc to avoid use of uninitialised memory.jsing2019-04-191-6/+6
* Allocate fixed NIDs for SM3/SM4.jsing2019-04-191-0/+12
* Rewrite & fix X509V3_add_value()tb2019-04-161-17/+24
* indent err: labelstb2019-04-161-7/+7
* wrap an overlong line and kill a space before a tabtb2019-04-161-3/+4
* Move function types to their own lines; rewrap.tb2019-04-161-30/+40
* Avoid signed integer overflow.jsing2019-04-151-2/+2
* Add input validation to BIO_read()/BIO_write().jsing2019-04-141-4/+14
* Some more malloc() to calloc() conversions.jsing2019-04-141-7/+5
* Remove two pointless chunks of code.jsing2019-04-141-16/+1
* Use calloc() when allocating cipher_data.jsing2019-04-141-5/+5
* Annotate a future improvement.jsing2019-04-141-1/+2
* Avoid potential double-frees following EVP_CIPHER_CTX_copy().jsing2019-04-141-4/+17
* Fix previous: I forgot to rename the bn_to_string() prototype.tb2019-04-141-2/+2
* Null out pointers on asprintf() failure.tb2019-04-131-3/+7
* Avoid quadratic behavior of decimal BIGNUM conversiontb2019-04-131-9/+36
* Avoid leak in SSL_dup_CA_list()tb2019-04-131-8/+14
* Avoid an overread caused by d2i_PrivateKey().jsing2019-04-101-1/+3
* Recommend SSL_CTX_add1_chain_cert(3) rather thanschwarze2019-04-091-12/+11
* Document SSL_CTX_clear_mode(3) and SSL_clear_mode(3).schwarze2019-04-091-22/+48
* Revert tasn_prn.c r1.18.jsing2019-04-071-6/+2
* By design, our state machine is a DAG contrary to the state machine intb2019-04-054-7/+29
* Import SSL_CTX_add1_chain_cert(3) from OpenSSL branch 1.1.1, which is stillschwarze2019-04-055-17/+264
* Zap two dead #defines that were unused since jsing deleted thetb2019-04-051-5/+1
* Implement legacy fallback for the TLS 1.3 client.jsing2019-04-043-8/+87
* Clean up the cipher/digest table mess.jsing2019-04-043-179/+45
* Only assign destlen when src is non-NULL.jsing2019-04-041-3/+4
* Switch to pthread_mutex_init().jsing2019-04-041-3/+5
* Bump libssl/libtls minors due to symbol addition.jsing2019-04-042-2/+2
* Provide SSL chain/cert chain APIs.jsing2019-04-043-2/+161
* This case also needs to be fatal.jsing2019-04-041-1/+2
* update root CAs in cert.pem in sync with Mozillasthen2019-04-041-287/+440
* Avoid some out of bound accesses in aesni_cbc_hmac_sha1_cipher().tb2019-04-031-7/+13
* fix broken commentsthen2019-04-021-1/+1
* Add a mutex to guard reference counting for tls_config.jsing2019-04-013-4/+16
* Implement a print function for BIGNUM_it.jsing2019-04-011-2/+18
* Correct the return values from long_print.jsing2019-04-011-2/+5
* Require all ASN1_PRIMITIVE_FUNCS functions to be provided.jsing2019-04-015-26/+42
* mark ERR_R_INTERNAL_ERROR instead of assert or _exit, sighderaadt2019-04-011-3/+3
* Correct subtle bug in sigalgs, only care about curve_nid if we arebeck2019-04-011-4/+4
* Clean up and simplify the client verify code:jsing2019-03-311-50/+49
* Wrap long lines and apply some style(9).jsing2019-03-311-7/+10
* Use named field initialisers.jsing2019-03-312-16/+18
* Use correct capitalization of EC_GROUP_get_curve_GF{2m,p}(3).tb2019-03-291-4/+4
* Cast nonce bytes to avoid undefined behaviour when left shifting.jsing2019-03-271-3/+3
* remove duplicate set key file call. from alf.tedu2019-03-271-3/+1