summaryrefslogtreecommitdiff
path: root/src (unfollow)
Commit message (Expand)AuthorFilesLines
2015-02-15lsearch and lfind return void *tedu1-4/+4
2015-02-14Support for nc -T on IPv6 addresses.jca1-7/+16
2015-02-14Remove asn1_ex_i2c() prototype, now that this function has been made static;miod2-4/+2
2015-02-14Words read better when they are separated by spaces.miod2-2/+2
2015-02-141.18 would introduce a possible out-of-bounds access in the error path;miod2-14/+10
2015-02-14Remove DEBUG_PKCS5V2 code.miod2-50/+2
2015-02-14Unchecked allocations in x509_name_canon().miod2-2/+10
2015-02-14Memory leak upon error in X509_add1_{trust,reject}_object.miod2-14/+46
2015-02-14Manually expand IMPLEMENT_EXTERN_ASN1 macro (the only occurence in crypto).jsing2-6/+20
2015-02-14Remove IMPLEMENT_COMPAT_ASN1() and related support code. Nothing uses it inmiod10-282/+14
2015-02-14Make asn1_ex_i2c() static. ok jsing@miod2-4/+8
2015-02-14Memory leak in `should not happen' condition; Coverity CID 78889.miod2-8/+8
2015-02-14Memory leak upon error; Coverity CID 78857miod2-2/+8
2015-02-14Check i2d_name_canon() for failure (negative return). Coverity CID 78888.miod2-12/+16
2015-02-14Possible NULL pointer dereferences. Coverity CID 21719, 21732.miod4-6/+14
2015-02-14Potential NULL dereference in the error path; Coverity CID 21720miod2-4/+4
2015-02-14Coverity CID 21733 (unchecked allocation), 78823 (leak on error).miod2-2/+12
2015-02-14Check for allocation error in RSA_eay_mod_exp(). Coverity CID 25217.miod4-4/+14
2015-02-14Memory leaks upon error. Coverity CID 78874.miod2-20/+20
2015-02-14Fix tests that got incorrectly inverted with the BN_CTX_get() return checkjsing2-10/+10
2015-02-14Expand ASN1_CHOICE*, ASN1_SEQUENCE* and associated macros, making thejsing6-120/+832
2015-02-14Expand ASN1_CHOICE*, ASN1_SEQUENCE* and associated macros, making thejsing2-18/+106
2015-02-14Attempt to correctly free temporary storage upon error. With help frommiod2-30/+36
2015-02-14second batch of perlpod(1) to mdoc(7) conversionschwarze23-924/+1381
2015-02-14While doing development work on pod2mdoc(1),schwarze11-534/+773
2015-02-14Spell NULL correctly, be explicit with NULL checks and it is also easier tojsing4-20/+12
2015-02-14Fix pod markup error.miod1-1/+1
2015-02-14Try and fix a bunch of memory leaks upon error;miod6-24/+66
2015-02-14Consistently check the return value from BN_CTX_get() on assignment.jsing8-84/+88
2015-02-13End sentences with dots.miod1-3/+3
2015-02-13Don't leak memory on errors - fixes coverity issues 105353 105253beck2-8/+18
2015-02-13fix leaking of bn, coverity issue 105351beck2-2/+4
2015-02-12prevent a crash with openssl asn1parse -genstr FORMATjsg2-2/+10
2015-02-12bump minor for TLS_PROTOCOLS_ALL. OK jsing@reyk1-1/+1
2015-02-12Add a tls_config_parse_protocols() function that allows a protocols stringjsing2-2/+63
2015-02-12Fix handling of "legacy" mode for tls_config_set_dheparams().jsing1-2/+2
2015-02-12qsort() compare functions MUST use memcmp() instead of bcmp() to haveguenther1-2/+4
2015-02-12Change TLS_PROTOCOLS_DEFAULT to be TLSv1.2 only. Add a TLS_PROTOCOLS_ALLjsing1-2/+4
2015-02-12If you do not support POSIX I/O then you're not tall enough to ride...jsing8-46/+8
2015-02-12unifdef -m -UOPENSSL_NO_NEXTPROTONEG - NPN is being replaced with ALPN,jsing8-48/+8
2015-02-12swap limits.h for sys/limits.hbcook1-1/+1
2015-02-11use a width specifier for lists, and Sq rather than Dq for single lettersjmc1-3/+3
2015-02-11Provide a tls_connect_servername() function that has the same behaviourjsing4-6/+27
2015-02-11Be consistent with naming - only use "host" and "hostname" when referringjsing6-60/+61
2015-02-11Do not rely upon malloc(0) not returning NULL. Not all malloc implementationsmiod1-6/+10
2015-02-11Guenther has plans for OPENSSL_NO_CMS, so revert this for the moment.beck18-24/+246
2015-02-11the possible algos for pref should be documented heretedu1-4/+11
2015-02-11Remove initialisers with default values from the ASN1 data structures.jsing34-376/+46
2015-02-11get rid of OPENSSL_NO_CMS code we do not use.beck18-246/+24
2015-02-11get rid of OPENSSL_NO_COMP code we don't use.beck4-22/+4