summaryrefslogtreecommitdiff
path: root/src (unfollow)
Commit message (Expand)AuthorFilesLines
2015-02-06Remove accidental, commented out code.doug2-22/+2
2015-02-06Unifdef NETSCAPE_HANG_BUG.jsing2-44/+2
2015-02-06Add additional checks to ssl3_send_client_key_exchange() that ensuresjsing2-36/+50
2015-02-06Import BoringSSL's crypto bytestring and crypto bytebuilder APIs.doug12-2/+3359
2015-02-06Add libssl ciphers regress, which currently only coversjsing3-1/+130
2015-02-06Bring back the horrible API that is get_cipher_by_char/put_cipher_by_char.jsing28-30/+176
2015-02-06Rename SSL_CTX_use_certificate_chain() to SSL_CTX_use_certificate_chain_mem().reyk8-21/+22
2015-02-05Declare the x509_(mem|file|dir)_lookup symbols as static because theyreyk6-12/+12
2015-01-30Make the TLS connect and accept error messages consistent.bluhm2-5/+4
2015-01-29Use .Rv where appropriate, and move it to RETURN VALUES;schwarze3-27/+13
2015-01-28dial the time back to about 0.1s, closer to the original targets andtedu1-4/+4
2015-01-28Fix a number of issues relating to algorithms in signatures, Mostlybeck14-18/+116
2015-01-26Place the remainder of e_os2.h under #ifndef LIBRESSL_INTERNAL until we canjsing1-1/+5
2015-01-26Add AEAD as a "MAC alias" so that it is possible to identify/select ciphersjsing4-4/+14
2015-01-24Convert openssl(1) sess_id to the new option handling.doug1-88/+113
2015-01-24Convert openssl(1)'s rsa.c to the new option handling code.doug1-184/+251
2015-01-23Ensure that a ServerKeyExchange message is received if the selected cipherjsing2-10/+36
2015-01-22Use field names in struct initialisers.jsing6-66/+66
2015-01-22last entry in NAME should not have a trailing comma;jmc1-2/+2
2015-01-22Add MLINK for tls_config_set_ca_mem()reyk1-1/+2
2015-01-22Allow to to load the CA chain directly from memory instead ofreyk6-8/+39
2015-01-22Support CA verification in chroot'ed processes without direct filereyk6-6/+20
2015-01-22Add X509_STORE_load_mem() to load certificates from a memory bufferreyk9-8/+338
2015-01-22Make it obvious which openssl test complained and whether it was expected.doug1-2/+5
2015-01-22Assume that the size of a pointer will not change at runtime.bcook2-56/+30
2015-01-21Fix DTLS memory leak (CVE-2015-0206).libressl-v2.1.3doug2-18/+46
2015-01-20Missing $OpenBSD$'s.krw5-0/+5
2015-01-19Add arc4random/getentropy shims for NetBSD.bcook4-0/+300
2015-01-17Improve wording in alloca.tedu1-7/+5
2015-01-16Use ">", not ">=" when comparing length to HOST_NAME_MAX sincemillert1-3/+3
2015-01-16Replace HOST_NAME_MAX+1-1 with HOST_NAME_MAX. OK deraad@millert2-8/+8
2015-01-16Replace check for ">= HOST_NAME_MAX+1" with "> HOST_NAME_MAX".millert1-1/+1
2015-01-16Move to the <limits.h> universe.deraadt23-57/+40
2015-01-16The SSL/TLS session Id context is limited to 32 bytes. Instead ofreyk1-1/+13
2015-01-16Delete the MANLINT variable and the related SUFFIXES rules becauseschwarze2-4/+4
2015-01-15remove unused variablechl1-2/+1
2015-01-15back in september I did the large abstraction refactoring to allow thesederaadt14-14/+28
2015-01-15Make strlcpy/strlcat slightly easier to read.millert4-86/+82
2015-01-13For non-blocking sockets tls_connect_fds() could fail with EAGAIN.bluhm2-7/+22
2015-01-13Document the openssl s_client -proxy feature.bluhm1-2/+14
2015-01-13Add the possibility to use the openssl s_client tool with an httpbluhm1-4/+24
2015-01-13Implement more thorough error checks:lteo1-12/+38
2015-01-12rename blocks to words. bcrypt "blocks" are unrelated to blowfish blocks,tedu1-9/+9
2015-01-12Fix a memory leak in bss_dgram.doug2-6/+26
2015-01-08Convert spkac.c to the new option handling code.doug1-100/+137
2015-01-08Convert pkcs8.c to the new option handling code.doug1-157/+220
2015-01-08Convert asn1pars.c to the new option handling.doug1-137/+206
2015-01-08missing , found by Dongsheng Songderaadt1-3/+3
2015-01-08Avoid a double-free in an error path.doug2-2/+4
2015-01-07stupid me. need errno.htedu1-1/+2