summaryrefslogtreecommitdiff
path: root/src (unfollow)
Commit message (Expand)AuthorFilesLines
2015-01-22Add MLINK for tls_config_set_ca_mem()reyk1-1/+2
2015-01-22Allow to to load the CA chain directly from memory instead ofreyk6-8/+39
2015-01-22Support CA verification in chroot'ed processes without direct filereyk6-6/+20
2015-01-22Add X509_STORE_load_mem() to load certificates from a memory bufferreyk9-8/+338
2015-01-22Make it obvious which openssl test complained and whether it was expected.doug1-2/+5
2015-01-22Assume that the size of a pointer will not change at runtime.bcook2-56/+30
2015-01-21Fix DTLS memory leak (CVE-2015-0206).libressl-v2.1.3doug2-18/+46
2015-01-20Missing $OpenBSD$'s.krw5-0/+5
2015-01-19Add arc4random/getentropy shims for NetBSD.bcook4-0/+300
2015-01-17Improve wording in alloca.tedu1-7/+5
2015-01-16Use ">", not ">=" when comparing length to HOST_NAME_MAX sincemillert1-3/+3
2015-01-16Replace HOST_NAME_MAX+1-1 with HOST_NAME_MAX. OK deraad@millert2-8/+8
2015-01-16Replace check for ">= HOST_NAME_MAX+1" with "> HOST_NAME_MAX".millert1-1/+1
2015-01-16Move to the <limits.h> universe.deraadt23-57/+40
2015-01-16The SSL/TLS session Id context is limited to 32 bytes. Instead ofreyk1-1/+13
2015-01-16Delete the MANLINT variable and the related SUFFIXES rules becauseschwarze2-4/+4
2015-01-15remove unused variablechl1-2/+1
2015-01-15back in september I did the large abstraction refactoring to allow thesederaadt14-14/+28
2015-01-15Make strlcpy/strlcat slightly easier to read.millert4-86/+82
2015-01-13For non-blocking sockets tls_connect_fds() could fail with EAGAIN.bluhm2-7/+22
2015-01-13Document the openssl s_client -proxy feature.bluhm1-2/+14
2015-01-13Add the possibility to use the openssl s_client tool with an httpbluhm1-4/+24
2015-01-13Implement more thorough error checks:lteo1-12/+38
2015-01-12rename blocks to words. bcrypt "blocks" are unrelated to blowfish blocks,tedu1-9/+9
2015-01-12Fix a memory leak in bss_dgram.doug2-6/+26
2015-01-08Convert spkac.c to the new option handling code.doug1-100/+137
2015-01-08Convert pkcs8.c to the new option handling code.doug1-157/+220
2015-01-08Convert asn1pars.c to the new option handling.doug1-137/+206
2015-01-08missing , found by Dongsheng Songderaadt1-3/+3
2015-01-08Avoid a double-free in an error path.doug2-2/+4
2015-01-07stupid me. need errno.htedu1-1/+2
2015-01-07set errno = EINVAL for invalid salts and hashes in most functions.tedu1-12/+20
2015-01-07mix in more virtual memory and process informationbcook2-4/+8
2015-01-06add initial HP-UX getentropy/arc4random support.bcook4-0/+992
2015-01-05rename kern enter/exit macros to malloc enter/leave to better reflecttedu1-7/+7
2015-01-05Convert openssl(1) passwd to new option handling.jsing1-119/+151
2015-01-05convert clock() to clock_gettime() for improved precision (and accuracy?)tedu1-7/+9
2015-01-05Zap a reference to .rnd, which is likely the last RANDFILE remnant onlteo1-3/+2
2015-01-03Fix incorrect OPENSSL_assert() usage.doug2-48/+106
2015-01-03Check the return values of several reallocarray() calls. While here,lteo3-3/+17
2015-01-02Rename the tls_connect_socket() parameter 'socket' to 's' to avoidbluhm1-4/+4
2015-01-02Remove ifdef statements for TIMES and USE_TOD; they don't do anything,lteo1-5/+1
2015-01-01Provide option types for binary AND, binary OR and silently discarding anjsing2-2/+13
2015-01-01Convert the openssl(1) enc command to the new option parsing and usage.jsing1-250/+382
2015-01-01Revert previous; tls_accept_socket() was intentionally undocumentedschwarze1-7/+1
2015-01-01minimally document tls_accept_socket();schwarze1-2/+8
2014-12-30copy bcrypt autotune from encrypt(1) and expose via crypt_newhashtedu2-5/+43
2014-12-29don't leak timing info about padding errors by generating a fake keytedu2-10/+20
2014-12-28Fix subtle typo.jsing1-2/+2
2014-12-28Add regress tests for default option handling.jsing1-1/+48