summaryrefslogtreecommitdiff
path: root/src (unfollow)
Commit message (Expand)AuthorFilesLines
2015-07-19abort when ENGINE_remove fails, fix Coverity 21656bcook2-10/+4
2015-07-18Convert dtls1_get_message_header to CBS and change to int.doug6-32/+74
2015-07-18rand_err doesn't exist anymore, coverity 78808beck2-6/+6
2015-07-18Coverity 21651beck2-6/+14
2015-07-18Convert dtls1_get_record to CBS.doug2-42/+56
2015-07-18Remove repeated code in dtls1_get_record.doug2-80/+32
2015-07-18Set SSL_MODE_ENABLE_PARTIAL_WRITE and SSL_MODE_ACCEPT_MOVING_WRITE_BUFFERbluhm1-1/+4
2015-07-18Dead code, Coverity 78798beck2-6/+2
2015-07-18simplify length checking in do_indefinite_convertbcook1-11/+17
2015-07-18Coverity ID 78910 - Yet another stupid API designed to not show failures. do thebeck2-12/+16
2015-07-18Remove SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER workaround.doug10-58/+26
2015-07-18remove mysterious, decorative comment blockletsbcook1-21/+21
2015-07-18Explicitly mark ignored BN_* return vals in tests.bcook1-6/+6
2015-07-18check sscanf conversion, fixes Coverity 21666bcook1-2/+6
2015-07-18Check the return value of ASN1_STRING_set(), for it may fail to allocatemiod4-12/+28
2015-07-18Remove support for the SSL_OP_TLS_D5_BUG compat hack from SSLeay.doug6-28/+22
2015-07-18Unbreak, add errno headerjeremy1-1/+2
2015-07-18set errno in null cases, just in case.tedu1-2/+3
2015-07-18standards compliant error return (null). will make ruby happier, at least.tedu1-5/+2
2015-07-18Fix leak found by coverity, issue 78897 - which also brough tobeck6-50/+66
2015-07-17delete doubled words;schwarze8-8/+8
2015-07-17extenstion -> extensionmiod2-2/+2
2015-07-17fix leak, found by coverity, ID 78877beck1-3/+3
2015-07-17Convert ssl_parse_serverhello_use_srtp_ext to CBS.doug4-24/+34
2015-07-17Remove SSLv3 support from openssl(1) s_time.doug1-13/+3
2015-07-17Remove SSLv3 support from openssl(1) s_server.doug1-7/+2
2015-07-17Remove SSLv3 support from openssl(1) s_client.doug1-4/+1
2015-07-17Remove support for SSLv3 from openssl(1) ciphers.doug1-27/+5
2015-07-17Remove compat hack that disabled ECDHE-ECDSA on OS X.doug10-208/+26
2015-07-17Remove workaround for TLS padding bug from SSLeay days.doug13-79/+25
2015-07-16Bump LIBRESSL_VERSION defines.bcook2-6/+14
2015-07-16Enforce V_ASN1_OCTET_STRING type before accessing the object as octet string;miod2-4/+8
2015-07-16fix coverity leak - ID 78921beck1-3/+11
2015-07-16kill leak, found by coverity, ID 105348beck1-2/+5
2015-07-16After reading a password with terminal echo off, restore the terminal toguenther2-12/+10
2015-07-16Explicitely cast a char into unsigned long before shifting it left by 24, formiod2-4/+4
2015-07-16Check return value of all used functions in OCSP_REQUEST_print(); coversmiod2-10/+18
2015-07-16Make sure the `reject negative sizes' logic introduced in 1.34 is actuallymiod2-6/+8
2015-07-15check n before cbs_init, coverity - ID 125063beck2-6/+18
2015-07-15test for n<0 before use in CBS_init - mostly to shut up coverity.beck6-22/+66
2015-07-15Flense out dead code, we don't do ecdhe_clnt_cert.beck4-374/+150
2015-07-15Fix inverted test in previous. Commit message told what we intended, butmiod2-4/+4
2015-07-15Remove dead code. Coverity CID 21688miod2-8/+2
2015-07-15Fix two theoretical NULL pointer dereferences which can only happen if youmiod2-8/+18
2015-07-15Fix possible 32 byte buffer overrun, found by coverity, CID 78869beck2-4/+4
2015-07-15Memory leak; Coverity CID 78836miod2-12/+16
2015-07-15Unchecked allocations, and make sure we do not leak upon error. Fixesmiod2-42/+72
2015-07-15Avoid leaking objects upon error; tweaks & ok doug@miod2-36/+36
2015-07-15Do not allow TS_check_signer_name() with signer == NULL frommiod2-2/+8
2015-07-15Previous fix for Coverity CID 21785 did not cope correctly with seed_len != 0,miod2-2/+6