summaryrefslogtreecommitdiff
path: root/src/lib (follow)
Commit message (Expand)AuthorAgeFilesLines
* Rename tls_config_insecure_noverifyhost() tojsing2015-02-224-21/+20
* Check return values when setting dheparams and ecdhecurve for the defaultjsing2015-02-221-11/+14
* In the interests of being secure by default, make the default TLS ciphersjsing2015-02-222-2/+17
* explain how tls_accept_socket works.tedu2015-02-211-2/+9
* tls_config_set_protocols is really void. Greg Martin.tedu2015-02-211-3/+3
* fill out docs a bit more, notably the read/write again behaviors.tedu2015-02-211-3/+27
* If BN_rand() or BN_pseudo_rand() are called with a NULL rnd argument,jsing2015-02-192-6/+16
* Memory leak in error path. Coverity CID 78822.miod2015-02-172-16/+18
* Amend documentation for AI_ADDRCONFIGjca2015-02-161-2/+4
* third batch of perlpod(1) to mdoc(7) conversionschwarze2015-02-1625-1367/+2121
* Avoid calling BN_CTX_end() on a context that wasn't started.doug2015-02-152-8/+8
* Regenmiod2015-02-156-528/+564
* s/tls_load_keys/tls_load_file/jsing2015-02-151-2/+2
* Document tls_config_parse_protocols() and update documentation forjsing2015-02-152-5/+27
* If we decide to discard the provided seed buffer because its size is notmiod2015-02-152-16/+12
* Check ASN1_OCTET_STRING_new() for failure. Coverity CID 78904miod2015-02-152-12/+16
* In ec_wNAF_mul(), move the declaration of tmp_wNAF higher in scope, so thatmiod2015-02-152-12/+10
* lsearch and lfind return void *tedu2015-02-151-4/+4
* Remove asn1_ex_i2c() prototype, now that this function has been made static;miod2015-02-142-4/+2
* Words read better when they are separated by spaces.miod2015-02-142-2/+2
* 1.18 would introduce a possible out-of-bounds access in the error path;miod2015-02-142-14/+10
* Remove DEBUG_PKCS5V2 code.miod2015-02-142-50/+2
* Unchecked allocations in x509_name_canon().miod2015-02-142-2/+10
* Memory leak upon error in X509_add1_{trust,reject}_object.miod2015-02-142-14/+46
* Manually expand IMPLEMENT_EXTERN_ASN1 macro (the only occurence in crypto).jsing2015-02-142-6/+20
* Remove IMPLEMENT_COMPAT_ASN1() and related support code. Nothing uses it inmiod2015-02-1410-282/+14
* Make asn1_ex_i2c() static. ok jsing@miod2015-02-142-4/+8
* Memory leak in `should not happen' condition; Coverity CID 78889.miod2015-02-142-8/+8
* Memory leak upon error; Coverity CID 78857miod2015-02-142-2/+8
* Check i2d_name_canon() for failure (negative return). Coverity CID 78888.miod2015-02-142-12/+16
* Possible NULL pointer dereferences. Coverity CID 21719, 21732.miod2015-02-144-6/+14
* Potential NULL dereference in the error path; Coverity CID 21720miod2015-02-142-4/+4
* Coverity CID 21733 (unchecked allocation), 78823 (leak on error).miod2015-02-142-2/+12
* Check for allocation error in RSA_eay_mod_exp(). Coverity CID 25217.miod2015-02-144-4/+14
* Memory leaks upon error. Coverity CID 78874.miod2015-02-142-20/+20
* Fix tests that got incorrectly inverted with the BN_CTX_get() return checkjsing2015-02-142-10/+10
* Expand ASN1_CHOICE*, ASN1_SEQUENCE* and associated macros, making thejsing2015-02-146-120/+832
* Expand ASN1_CHOICE*, ASN1_SEQUENCE* and associated macros, making thejsing2015-02-142-18/+106
* Attempt to correctly free temporary storage upon error. With help frommiod2015-02-142-30/+36
* second batch of perlpod(1) to mdoc(7) conversionschwarze2015-02-1423-924/+1381
* While doing development work on pod2mdoc(1),schwarze2015-02-1411-534/+773
* Spell NULL correctly, be explicit with NULL checks and it is also easier tojsing2015-02-144-20/+12
* Fix pod markup error.miod2015-02-141-1/+1
* Try and fix a bunch of memory leaks upon error;miod2015-02-146-24/+66
* Consistently check the return value from BN_CTX_get() on assignment.jsing2015-02-148-84/+88
* End sentences with dots.miod2015-02-131-3/+3
* Don't leak memory on errors - fixes coverity issues 105353 105253beck2015-02-132-8/+18
* fix leaking of bn, coverity issue 105351beck2015-02-132-2/+4
* prevent a crash with openssl asn1parse -genstr FORMATjsg2015-02-122-2/+10
* bump minor for TLS_PROTOCOLS_ALL. OK jsing@reyk2015-02-121-1/+1