summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Expand)AuthorAgeFilesLines
* add stdlib.h for reallocarraybcook2019-05-231-1/+2
* *an* RSA;jmc2019-05-203-9/+9
* clarify that later flags modify earlier flags;schwarze2019-05-191-2/+4
* More consistently put remarks about the less useful LC_* categoties,schwarze2019-05-162-14/+26
* delete two stray blank linesschwarze2019-05-151-4/+2
* check result of ftruncate() as we do write() belowbcook2019-05-151-2/+4
* s3 is never NULL since s2 (formerly used for SSLv2) does not exist, so there isbcook2019-05-153-29/+20
* Correct missing test to determine if length is in bytes or in bits.beck2019-05-141-1/+3
* Use propper regress target to integrate better into test framework.bluhm2019-05-141-2/+4
* Remove unused pad check, which is handled by tls1_cbc_remove_padding() now.bcook2019-05-131-4/+2
* Acquire mutex before incrementing the refcount. Fixes COV-186144bcook2019-05-131-1/+3
* Move 'how this works' details from namespace.h to DETAILSguenther2019-05-132-112/+136
* explicitly mention that RES_NOALIASES has no effect;schwarze2019-05-131-3/+4
* Mention introduction of *_conceal.otto2019-05-131-2/+8
* The call to fseek(fp, -1, SEEK_END) also sets the reported size tobluhm2019-05-131-10/+10
* Fix signed overflow in X509_CRL_print().tb2019-05-121-1/+4
* Revert the other hunk of r1.36 as well: in the case of CCM, ccm.key istb2019-05-121-1/+11
* Stop the eyebleed in here and just use callocbeck2019-05-121-31/+8
* $OpenBSD$tb2019-05-114-0/+4
* Remove commented out rc5 bitstb2019-05-117-20/+6
* Initialize EC_KEY_METHOD before use.bcook2019-05-101-2/+2
* Revert part of r1.36: in the case of GCM, gcm.key is assigned fromtb2019-05-101-1/+7
* Inroduce malloc_conceal() and calloc_conceal(). Similar to theirotto2019-05-102-199/+219
* Add a test vector for Streebog 512 from Guido Vrankentb2019-05-091-1/+2
* Fix incorrect carry operation in 512 bit addition: in the casetb2019-05-091-6/+8
* Proper prototype for main(). Make sparc64 happier.claudio2019-05-091-2/+4
* In DTLS, use_srtp is part of the extended server hello while in TLSv1.3,tb2019-05-081-2/+3
* initialize safestack pointersbcook2019-05-083-6/+6
* Make sure that the tag buffer size is equal to the tag sizetb2019-05-081-2/+2
* Add test fseek(,-1) works properly.yasuoka2019-05-021-3/+8
* Avoid an undefined shift in ASN1_ENUMERATED_get().tb2019-04-281-4/+9
* Avoid an undefined shift in ASN1_INTEGER_get().tb2019-04-281-4/+8
* Use calloc/freezero when allocating and freeing the session ticket data.jsing2019-04-251-4/+6
* Use EVP_CIPHER_CTX_{new,free}() and HMAC_CTX_{new,free}() instead ofjsing2019-04-251-24/+29
* Rename some variables in tls_decrypt_ticket().jsing2019-04-251-18/+18
* Do not check for working go executable during make clean cleandir obj.bluhm2019-04-241-1/+3
* Do not check for working go executable during make clean cleandir obj.bluhm2019-04-241-1/+3
* Convert tls_decrypt_ticket() to CBS.jsing2019-04-231-44/+72
* Add error checking to i2v_POLICY_MAPPINGS().tb2019-04-221-9/+26
* Add error checking to i2v_POLICY_CONSTRAINTS().tb2019-04-221-5/+19
* Add error checking to i2v_EXTENDED_KEY_USAGE().tb2019-04-221-8/+23
* Add error checking to i2v_ASN1_BIT_STRING().tb2019-04-221-4/+18
* Add error checking to i2v_BASIC_CONSTRAINTS().tb2019-04-221-3/+18
* Add error checking to i2v_AUTHORITY_INFO_ACCESS(). While there, replacetb2019-04-221-19/+27
* Avoid potential double frees in i2v_AUTHORITY_KEYID(), i2v_GENERAL_NAME()tb2019-04-222-6/+22
* Provide a derr label (decode/decrypt error) in tls1_decrypt_ticket().jsing2019-04-221-41/+29
* Pass the session ID down to the session/ticket handling code as a CBS.jsing2019-04-224-35/+36
* Inline and remove the tlsext_tick_md macro.jsing2019-04-223-6/+5
* Add error checking to i2v_AUTHORITY_KEYID(), i2v_GENERAL_NAME()tb2019-04-212-32/+80
* The noop v2i_PKEY_USAGE_PERIOD() has been commented out since becktb2019-04-211-14/+2