summaryrefslogtreecommitdiff
path: root/src/lib (follow)
Commit message (Expand)AuthorAgeFilesLines
* Fix a NULL dereference in GENERAL_NAME_cmp()libressl-v3.2.3tb2020-12-086-11/+94
* Ensure leaf is set up on X509_STORE_CTX before verification.jsing2020-09-261-9/+7
* Call dtls1_hm_fragment_free() from dtls1_drain_fragments()jsing2020-09-262-8/+7
* Have dtls1_new() call dtls1_free() on failure.jsing2020-09-261-36/+22
* Have dtls1_hm_fragment_new() call dtls1_hm_fragment_free() on failure.jsing2020-09-261-26/+17
* Refactor dtls1_clear_queues()tb2020-09-261-25/+26
* jumping into the x509 fray with a bunch of whitespace repairderaadt2020-09-261-6/+6
* bump to LibreSSL 3.2.2 ahead of lockbcook2020-09-251-3/+3
* KNF for a few comments and indent a labeltb2020-09-251-8/+12
* Remove some dangling elses for consistency with the rest of the filetb2020-09-251-25/+19
* Simplify UI_new_method()tb2020-09-251-10/+4
* Move variable declaration to the top of UI_set_result and ditchtb2020-09-251-19/+16
* The default branch of a switch somehow got moved inside of a pointlesstb2020-09-251-3/+3
* Simplify call to ERR_print_errors_cb()tb2020-09-251-5/+4
* Error out if ok_chars and cancel_chars overlaptb2020-09-241-2/+4
* Fix a number of leaks in the UI_dup_* functionstb2020-09-241-143/+99
* Push ERR_R_MALLOC_FAILURE onto the error stacktb2020-09-241-3/+3
* Make free_strings() NULL safetb2020-09-241-1/+3
* KNF and grammar tweaks for comments; wrap a few overlong prototypes.tb2020-09-241-163/+188
* Simplify the cleanup of init_buf via a ssl3_release_init_buffer() function.jsing2020-09-245-16/+22
* Release read and write buffers using freezero().jsing2020-09-244-21/+26
* Ensure chain is set on the X509_STORE_CTX before triggering callback.jsing2020-09-231-12/+39
* Comment out SSL_get0_peername(3) for the OpenBSD 6.8 releaseschwarze2020-09-221-4/+18
* reword ambiguous title line;schwarze2020-09-221-3/+3
* s/before the handshake is complete/during the handshake/gschwarze2020-09-211-8/+7
* two wording tweaks suggested by jsing@, adding clarityschwarze2020-09-211-5/+4
* In ssl.h rev. 1.174 to 1.176, tb@ added some stubs related to 0-RTT data.schwarze2020-09-213-4/+183
* Fix some line wrapping and other whitespace issues.tb2020-09-211-45/+34
* Move freeing and zeroing up to right after the while loop.tb2020-09-211-5/+5
* Avoid memleak caused by shadowingtb2020-09-201-2/+5
* KNF/whitespace nitstb2020-09-202-6/+7
* Correct a 1 byte read overflow in x509_contraints_uri and addbeck2020-09-201-4/+9
* Document the public function SSL_set_SSL_CTX(3) from scratch,schwarze2020-09-203-3/+72
* Add guards around SSL_get0_peername that were accidentally omitted.tb2020-09-201-1/+3
* Fix a memory leak in x509_constraints_extract_namestb2020-09-201-6/+6
* remove superfluous NULL checkbeck2020-09-191-2/+2
* Prepare to provide SSL_get0_peernametb2020-09-192-2/+9
* Prepare to provide stubbed out versions for reading/writing 0-RTT datatb2020-09-192-2/+41
* Prepare to provide SSL{,_CTX}_{get,set}_max_early_datatb2020-09-192-2/+34
* Prepare to provide SSL_SESSION_{set,get}_max_early_data()tb2020-09-192-2/+18
* If ssl_cert_dup() fails in SSL_set_SSL_CTX(3), return failureschwarze2020-09-181-5/+10
* add forgotten link to newish page SSL_set1_host(3)schwarze2020-09-181-3/+4
* Fix potential overflow in CN subject line parsing, thanks tobeck2020-09-181-4/+5
* Prepare to provide SSL_get_peer_tmp_key().jsing2020-09-172-9/+20
* Simplify SSL method lookups.jsing2020-09-175-66/+44
* Add a comment saying that the public function NAME_CONSTRAINTS_check(3)schwarze2020-09-171-2/+5
* Install the new page SSL_set1_host(3), link to it from relevant places,schwarze2020-09-176-22/+31
* Import a manual page for SSL_set1_host(3), which we already have since 6.5,schwarze2020-09-171-0/+155
* revert my putting this on a diet. sadly the NAME_CONSTRAINTS_checkbeck2020-09-161-7/+1
* Group seal record functions together.jsing2020-09-161-11/+11