summaryrefslogtreecommitdiff
path: root/src/lib (follow)
Commit message (Expand)AuthorAgeFilesLines
* Convert ssl_parse_serverhello_use_srtp_ext to CBS.doug2015-07-174-24/+34
* Remove compat hack that disabled ECDHE-ECDSA on OS X.doug2015-07-1710-208/+26
* Remove workaround for TLS padding bug from SSLeay days.doug2015-07-1712-74/+24
* Bump LIBRESSL_VERSION defines.bcook2015-07-162-6/+14
* Enforce V_ASN1_OCTET_STRING type before accessing the object as octet string;miod2015-07-162-4/+8
* After reading a password with terminal echo off, restore the terminal toguenther2015-07-162-12/+10
* Explicitely cast a char into unsigned long before shifting it left by 24, formiod2015-07-162-4/+4
* Check return value of all used functions in OCSP_REQUEST_print(); coversmiod2015-07-162-10/+18
* Make sure the `reject negative sizes' logic introduced in 1.34 is actuallymiod2015-07-162-6/+8
* check n before cbs_init, coverity - ID 125063beck2015-07-152-6/+18
* test for n<0 before use in CBS_init - mostly to shut up coverity.beck2015-07-156-22/+66
* Flense out dead code, we don't do ecdhe_clnt_cert.beck2015-07-154-374/+150
* Fix inverted test in previous. Commit message told what we intended, butmiod2015-07-152-4/+4
* Remove dead code. Coverity CID 21688miod2015-07-152-8/+2
* Fix two theoretical NULL pointer dereferences which can only happen if youmiod2015-07-152-8/+18
* Fix possible 32 byte buffer overrun, found by coverity, CID 78869beck2015-07-152-4/+4
* Memory leak; Coverity CID 78836miod2015-07-152-12/+16
* Unchecked allocations, and make sure we do not leak upon error. Fixesmiod2015-07-152-42/+72
* Avoid leaking objects upon error; tweaks & ok doug@miod2015-07-152-36/+36
* Do not allow TS_check_signer_name() with signer == NULL frommiod2015-07-152-2/+8
* Previous fix for Coverity CID 21785 did not cope correctly with seed_len != 0,miod2015-07-152-2/+6
* Partially convert ssl3_get_message to CBS.doug2015-07-142-12/+30
* Convert dtls1_get_hello_verify to CBS.doug2015-07-142-34/+46
* Convert ssl3_get_cipher_by_char to CBS.doug2015-07-142-4/+16
* Convert ssl3_get_client_certificate to CBS.doug2015-07-142-30/+38
* Convert ssl3_get_finished to CBS.doug2015-07-142-12/+18
* Convert ssl_parse_clienthello_use_srtp_ext to CBS.doug2015-07-144-84/+50
* Convert ssl3_get_cert_status to CBS.doug2015-07-142-34/+52
* Convert ssl3_get_server_certificate to CBS.doug2015-07-142-34/+36
* fix the build on arm after the recent addition of -Wundefjsg2015-06-292-4/+4
* Convert ssl_bytes_to_cipher_list to CBS.doug2015-06-284-20/+40
* Fix pointer to unsigned long conversion.doug2015-06-274-10/+14
* Put BUF_memdup() and BUF_reverse() under #ifndef LIBRESSL_INTERNAL.jsing2015-06-242-6/+4
* Stop using BUF_memdup() within the LibreSSL code base - it is correctlyjsing2015-06-244-12/+14
* Change CBS_dup() to also sync the offset.doug2015-06-232-2/+4
* Check for failure with CBB_init() in bs_ber.c.doug2015-06-212-4/+6
* Just return if nmemb is 0. Avoids a NULL dereference and ismillert2015-06-211-1/+4
* Convert ssl3_get_new_session_ticket to CBS.doug2015-06-202-48/+48
* Convert ssl3_get_next_proto to CBS.doug2015-06-202-28/+38
* Convert ssl_parse_serverhello_renegotiate_ext to CBS.doug2015-06-204-38/+42
* Handle NIST curve names.jsing2015-06-202-4/+8
* Have ECPKParameters_print() include the NIST curve name, if known.jsing2015-06-202-2/+20
* Provide EC_curve_nid2nist() and EC_curve_nist2nid().jsing2015-06-204-4/+114
* Make SSL_OP_ALL readable.jsing2015-06-202-4/+18
* Put CRYPTO_memcmp() under #ifndef LIBRESSL_INTERNAL.jsing2015-06-202-2/+6
* Replace remaining CRYPTO_memcmp() calls with timingsafe_memcmp().jsing2015-06-206-12/+12
* Convert ssl_parse_clienthello_renegotiate_ext to CBS.doug2015-06-204-30/+28
* Replace internal call to CRYPTO_memcmp with timingsafe_memcmp.doug2015-06-202-4/+4
* Fix warning on vax due to old gcc.doug2015-06-202-8/+8
* Crank major for libcrypto, ssl and tls due to MDC-2DES removal.doug2015-06-205-6/+6