summaryrefslogtreecommitdiff
path: root/src (unfollow)
Commit message (Expand)AuthorFilesLines
2019-06-04Remove the blinding later to avoid leaking information on the lengthtb1-3/+3
2019-06-04.In openssl/x509_vfy.hschwarze1-3/+4
2019-06-04Add several missing .In linesschwarze1-3/+13
2019-06-04Move to env var, likelky the possibility to set malloc options fromotto2-19/+8
2019-06-03add missing .In linesschwarze2-4/+6
2019-06-03add missing .In lineschwarze1-2/+3
2019-06-02Complete the ld.so boot cleanup: move most libc initialization fromguenther2-8/+5
2019-05-30__realpath(2) appears to have improved, so re-enable the code thatderaadt1-3/+136
2019-05-29Relax parsing of TLS key share extensions on the server.jsing1-5/+2
2019-05-29Do not send an SNI extension when resuming a session that contains a serverjsing1-1/+4
2019-05-29There are some bugs in __realpath(2) -- it isn't quite ready so disablederaadt1-136/+3
2019-05-28Fix typo and label indent.jsing1-3/+3
2019-05-28Tidy up some names/structures following the renaming of TLS extensionjsing1-35/+35
2019-05-28Enable the use of the kernel __realpath() system call in the libc wrapper.beck1-3/+136
2019-05-23Throw malloc_conceal and freezero into the mix.otto1-3/+8
2019-05-23Only override size of chunk if we're not given the actual length.otto1-2/+3
2019-05-23bump to LibreSSL 3.0.0bcook1-3/+3
2019-05-23add stdlib.h for reallocarraybcook1-1/+2
2019-05-20*an* RSA;jmc3-9/+9
2019-05-19clarify that later flags modify earlier flags;schwarze1-2/+4
2019-05-16More consistently put remarks about the less useful LC_* categoties,schwarze2-14/+26
2019-05-15delete two stray blank linesschwarze1-4/+2
2019-05-15check result of ftruncate() as we do write() belowbcook1-2/+4
2019-05-15s3 is never NULL since s2 (formerly used for SSLv2) does not exist, so there isbcook3-29/+20
2019-05-14Correct missing test to determine if length is in bytes or in bits.beck1-1/+3
2019-05-14Use propper regress target to integrate better into test framework.bluhm1-2/+4
2019-05-13Remove unused pad check, which is handled by tls1_cbc_remove_padding() now.bcook1-4/+2
2019-05-13Acquire mutex before incrementing the refcount. Fixes COV-186144bcook1-1/+3
2019-05-13Move 'how this works' details from namespace.h to DETAILSguenther2-112/+136
2019-05-13explicitly mention that RES_NOALIASES has no effect;schwarze1-3/+4
2019-05-13Mention introduction of *_conceal.otto1-2/+8
2019-05-13The call to fseek(fp, -1, SEEK_END) also sets the reported size tobluhm1-10/+10
2019-05-12Fix signed overflow in X509_CRL_print().tb1-1/+4
2019-05-12Revert the other hunk of r1.36 as well: in the case of CCM, ccm.key istb1-1/+11
2019-05-12Stop the eyebleed in here and just use callocbeck1-31/+8
2019-05-11$OpenBSD$tb4-0/+4
2019-05-11Remove commented out rc5 bitstb7-20/+6
2019-05-10Initialize EC_KEY_METHOD before use.bcook1-2/+2
2019-05-10Revert part of r1.36: in the case of GCM, gcm.key is assigned fromtb1-1/+7
2019-05-10Inroduce malloc_conceal() and calloc_conceal(). Similar to theirotto2-199/+219
2019-05-09Add a test vector for Streebog 512 from Guido Vrankentb1-1/+2
2019-05-09Fix incorrect carry operation in 512 bit addition: in the casetb1-6/+8
2019-05-09Proper prototype for main(). Make sparc64 happier.claudio1-2/+4
2019-05-08In DTLS, use_srtp is part of the extended server hello while in TLSv1.3,tb1-2/+3
2019-05-08initialize safestack pointersbcook3-6/+6
2019-05-08Make sure that the tag buffer size is equal to the tag sizetb1-2/+2
2019-05-02Add test fseek(,-1) works properly.yasuoka1-3/+8
2019-04-28Avoid an undefined shift in ASN1_ENUMERATED_get().tb1-4/+9
2019-04-28Avoid an undefined shift in ASN1_INTEGER_get().tb1-4/+8
2019-04-25Use calloc/freezero when allocating and freeing the session ticket data.jsing1-4/+6