summaryrefslogtreecommitdiff
path: root/src (unfollow)
Commit message (Expand)AuthorFilesLines
2019-05-28Enable the use of the kernel __realpath() system call in the libc wrapper.beck1-3/+136
2019-05-23Throw malloc_conceal and freezero into the mix.otto1-3/+8
2019-05-23Only override size of chunk if we're not given the actual length.otto1-2/+3
2019-05-23bump to LibreSSL 3.0.0bcook1-3/+3
2019-05-23add stdlib.h for reallocarraybcook1-1/+2
2019-05-20*an* RSA;jmc3-9/+9
2019-05-19clarify that later flags modify earlier flags;schwarze1-2/+4
2019-05-16More consistently put remarks about the less useful LC_* categoties,schwarze2-14/+26
2019-05-15delete two stray blank linesschwarze1-4/+2
2019-05-15check result of ftruncate() as we do write() belowbcook1-2/+4
2019-05-15s3 is never NULL since s2 (formerly used for SSLv2) does not exist, so there isbcook3-29/+20
2019-05-14Correct missing test to determine if length is in bytes or in bits.beck1-1/+3
2019-05-14Use propper regress target to integrate better into test framework.bluhm1-2/+4
2019-05-13Remove unused pad check, which is handled by tls1_cbc_remove_padding() now.bcook1-4/+2
2019-05-13Acquire mutex before incrementing the refcount. Fixes COV-186144bcook1-1/+3
2019-05-13Move 'how this works' details from namespace.h to DETAILSguenther2-112/+136
2019-05-13explicitly mention that RES_NOALIASES has no effect;schwarze1-3/+4
2019-05-13Mention introduction of *_conceal.otto1-2/+8
2019-05-13The call to fseek(fp, -1, SEEK_END) also sets the reported size tobluhm1-10/+10
2019-05-12Fix signed overflow in X509_CRL_print().tb1-1/+4
2019-05-12Revert the other hunk of r1.36 as well: in the case of CCM, ccm.key istb1-1/+11
2019-05-12Stop the eyebleed in here and just use callocbeck1-31/+8
2019-05-11$OpenBSD$tb4-0/+4
2019-05-11Remove commented out rc5 bitstb7-20/+6
2019-05-10Initialize EC_KEY_METHOD before use.bcook1-2/+2
2019-05-10Revert part of r1.36: in the case of GCM, gcm.key is assigned fromtb1-1/+7
2019-05-10Inroduce malloc_conceal() and calloc_conceal(). Similar to theirotto2-199/+219
2019-05-09Add a test vector for Streebog 512 from Guido Vrankentb1-1/+2
2019-05-09Fix incorrect carry operation in 512 bit addition: in the casetb1-6/+8
2019-05-09Proper prototype for main(). Make sparc64 happier.claudio1-2/+4
2019-05-08In DTLS, use_srtp is part of the extended server hello while in TLSv1.3,tb1-2/+3
2019-05-08initialize safestack pointersbcook3-6/+6
2019-05-08Make sure that the tag buffer size is equal to the tag sizetb1-2/+2
2019-05-02Add test fseek(,-1) works properly.yasuoka1-3/+8
2019-04-28Avoid an undefined shift in ASN1_ENUMERATED_get().tb1-4/+9
2019-04-28Avoid an undefined shift in ASN1_INTEGER_get().tb1-4/+8
2019-04-25Use calloc/freezero when allocating and freeing the session ticket data.jsing1-4/+6
2019-04-25Use EVP_CIPHER_CTX_{new,free}() and HMAC_CTX_{new,free}() instead ofjsing1-24/+29
2019-04-25Rename some variables in tls_decrypt_ticket().jsing1-18/+18
2019-04-24Do not check for working go executable during make clean cleandir obj.bluhm1-1/+3
2019-04-24Do not check for working go executable during make clean cleandir obj.bluhm1-1/+3
2019-04-23Convert tls_decrypt_ticket() to CBS.jsing1-44/+72
2019-04-22Add error checking to i2v_POLICY_MAPPINGS().tb1-9/+26
2019-04-22Add error checking to i2v_POLICY_CONSTRAINTS().tb1-5/+19
2019-04-22Add error checking to i2v_EXTENDED_KEY_USAGE().tb1-8/+23
2019-04-22Add error checking to i2v_ASN1_BIT_STRING().tb1-4/+18
2019-04-22Add error checking to i2v_BASIC_CONSTRAINTS().tb1-3/+18
2019-04-22Add error checking to i2v_AUTHORITY_INFO_ACCESS(). While there, replacetb1-19/+27
2019-04-22Avoid potential double frees in i2v_AUTHORITY_KEYID(), i2v_GENERAL_NAME()tb2-6/+22
2019-04-22Provide a derr label (decode/decrypt error) in tls1_decrypt_ticket().jsing1-41/+29