summaryrefslogtreecommitdiff
path: root/src (unfollow)
Commit message (Expand)AuthorFilesLines
2015-03-15fix for regression test for strtol(). it failed (the wrong kind ofphessler1-2/+2
2015-03-14remove incorrect statement. the standard *does* require calloc to checktedu1-7/+2
2015-03-11delay EVP_MD_CTX_init so we don't forget to clean it up.tedu2-6/+8
2015-03-08Reject DH keys sent by a server if they are considered too small; inspiredmiod3-40/+28
2015-03-05Do not use sha512-parisc for now, as it is subtly bugged - passes the shamiod2-2/+6
2015-03-05subtraction is not comparison. the difference of two longs is not goodtedu1-1/+1
2015-03-02Update comment to match code; Caspar Schutijserlibressl-v2.1.4millert1-2/+2
2015-03-02Fix a minor information leak that was introduced in t1_lib.c r1.71, wherebyjsing2-4/+4
2015-03-02use correct formatter (int, because of type promotion after operations)bcook1-2/+2
2015-02-28Reduce usage of predefined strings in manpages.bentley1-7/+7
2015-02-26Prefix function parameter names with underscores in tls.h, since this makesjsing1-42/+44
2015-02-25No need to use O_DIRECTORY when opening ".", O_RDONLY will suffice.millert1-1/+1
2015-02-25Fix CVE-2014-3570: properly calculate the square of a BIGNUM value.bcook7-1331/+672
2015-02-25Trivial fix for test progress output.bcook1-4/+7
2015-02-25Avoid NULL pointer deref in hashinfo_free() when calling from error paths.doug1-2/+3
2015-02-25Fix CVE-2015-0205: Do not accept client authentication with Diffie-Hellmanbcook2-4/+4
2015-02-24we don't let strtonum errors bleed through now.tedu1-4/+2
2015-02-24Set errno to EINVAL, instead of letting ERANGE escape out.tedu1-2/+4
2015-02-23fourth batch of perlpod(1) to mdoc(7) conversionschwarze37-1276/+2521
2015-02-22While slick, this isn't accessing multiple directories concurrently, soguenther1-29/+35
2015-02-22Bump libcrypto and libssl majors, due to various recent churn.jsing4-4/+4
2015-02-22Reluctantly add server-side support for TLS_FALLBACK_SCSV.jsing15-25/+159
2015-02-22There is not much point constructing an SSL_CIPHER, then callingjsing2-14/+6
2015-02-22Remove IMPLEMENT_STACK_OF noops.jsing4-8/+4
2015-02-22Update for recent verify related naming changes.jsing2-28/+28
2015-02-22Bump libtls major due to symbol removal.jsing1-3/+2
2015-02-22Rename tls_config_insecure_noverifyhost() tojsing4-21/+20
2015-02-22Check return values when setting dheparams and ecdhecurve for the defaultjsing1-11/+14
2015-02-22In the interests of being secure by default, make the default TLS ciphersjsing2-2/+17
2015-02-21explain how tls_accept_socket works.tedu1-2/+9
2015-02-21tls_config_set_protocols is really void. Greg Martin.tedu1-3/+3
2015-02-21fill out docs a bit more, notably the read/write again behaviors.tedu1-3/+27
2015-02-19If BN_rand() or BN_pseudo_rand() are called with a NULL rnd argument,jsing2-6/+16
2015-02-19BN_free() has its own NULL check.jsing1-14/+7
2015-02-19KNF.jsing1-766/+834
2015-02-18fix coverity 105350 and 10345beck1-1/+2
2015-02-17Memory leak in error path. Coverity CID 78822.miod2-16/+18
2015-02-16Amend documentation for AI_ADDRCONFIGjca1-2/+4
2015-02-16third batch of perlpod(1) to mdoc(7) conversionschwarze25-1367/+2121
2015-02-16Add more error checking and free resources in bytestringtest.doug1-26/+47
2015-02-15Avoid calling BN_CTX_end() on a context that wasn't started.doug2-8/+8
2015-02-15Use "In" to mark up include files, instead of wrongly wrapping with Aq.bentley1-3/+3
2015-02-15Regenmiod6-528/+564
2015-02-15s/tls_load_keys/tls_load_file/jsing1-2/+2
2015-02-15Document tls_config_parse_protocols() and update documentation forjsing2-5/+27
2015-02-15Fix various memory leaks by not exiting so abruptly from failed tests.miod1-579/+507
2015-02-15Remove ancient gcc workaround on mips.miod1-3/+2
2015-02-15Memory leak. Coverity CID 78865miod1-2/+3
2015-02-15Wrong logic; Coverity CID 78894miod1-1/+1
2015-02-15If we decide to discard the provided seed buffer because its size is notmiod2-16/+12