summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Collapse)AuthorAgeFilesLines
* missing \deraadt2014-07-111-2/+2
|
* formattingbeck2014-07-111-4/+6
| | | | ok bcook@
* add comment about format requirementsbeck2014-07-111-1/+3
| | | | ok miod@
* Modify formatting to make portable's life a lot easier.beck2014-07-111-7/+6
| | | | ok miod@ bcook@
* adapt addapt spelling to adapt; request from miodderaadt2014-07-112-6/+6
|
* Huge documentation update for libcrypto and libssl, mostly from Matt Caswell,miod2014-07-11100-283/+2781
| | | | | | Jeff Trawick, Jean-Paul Calderone, Michal Bozon, Jeffrey Walton and Rich Salz, via OpenSSL trunk (with some parts not applying to us, such as SSLv2 support, at least partially removed).
* If the application uses tls_session_secret_cb for session resumption, setmiod2014-07-112-4/+6
| | | | the CCS_OK flag. From OpenSSL trunk.
* Avoid invoking EVP_CIPHER_CTX_cleanup() on uninitialized memory; frommiod2014-07-112-4/+4
| | | | Coverity via OpenSSL trunk
* Fix a memory leak in BIO_free() which no current BIO can trigger; OpenSSLmiod2014-07-112-8/+6
| | | | PR #3439 via OpenSSL trunk
* Prevent infinite loop during configuration file parsing; OpenSSL PR #2985miod2014-07-112-4/+4
| | | | via OpenSSL trunk.
* Missing bounds check in do_PVK_body(); OpenSSL RT #2277, from OpenSSL trunk,miod2014-07-112-8/+20
| | | | but without a memory leak.
* OPENSSL_ALGORITHM_DEFINES has been removed from conf.h, no need for it nowtedu2014-07-112-16/+4
|
* In RSA_eay_private_encrypt(), correctly return the smaller BN; OpenSSLmiod2014-07-112-4/+4
| | | | PR #3418 via OpenSSL trunk
* In ssl3_get_cert_verify(), allow for larger messages to accomodate keysmiod2014-07-112-6/+4
| | | | | larger than 4096-bit RSA which the most paranoid of us are using; OpenSSL PR #319 via OpenSSL trunk.
* it has been 4888 days since the transient feature to define short macrostedu2014-07-112-116/+2
| | | | | for apps that haven't had time to make the appropriate changes was added. time's up.
* Apparently better fix for OpenSSL PR #3397 (Joyent bug #7704), from OpenSSLmiod2014-07-112-4/+4
| | | | trunk
* Also make these files parsable by pod2man..beck2014-07-111-6/+6
| | | | ok bcook@
* Make this file parsable by pod2man without errors.beck2014-07-111-6/+6
| | | | ok bcook@
* In ASN1_get_object(), reject primitive encodings using the indefinite lengthmiod2014-07-112-2/+8
| | | | constructed form. OpenSSL PR #2438 via OpenSSL trunk
* Fix copy for CCM, GCM and XTS.miod2014-07-112-24/+140
| | | | | | | | Internal pointers in CCM, GCM and XTS contexts should either be NULL or set to point to the appropriate key schedule. This needs to be adjusted when copying contexts. OpenSSL PR #3272 with further fixes, from OpenSSL trunk
* i'm a dumbdumb. fix build.tedu2014-07-1128-30/+30
|
* In asn1_get_length(), tolerate leading zeroes in BER encoding.miod2014-07-112-10/+16
| | | | OpenSSL PR #2746 via OpenSSL trunk
* In EVP_PBE_alg_add don't use the underlying NID for the ciphermiod2014-07-112-4/+4
| | | | as it may have a non-standard key size; OpenSSL PR #3206 via OpenSSL trunk.
* additional features: no buffer freelists and no heartbleedtedu2014-07-112-0/+6
|
* no compression is also a feature of libressltedu2014-07-112-0/+8
|
* move all the feature settings to a common header.tedu2014-07-1131-1875/+176
| | | | probably ok beck jsing miod
* Tolerate critical AKID in CRLs; OpenSSL PR #3014 via OpenSSL trunk, andmiod2014-07-112-14/+16
| | | | also update the comments to reflect what the code now does.
* Fix OID encoding for single components. OpenSSL PR #2556 via OpenSSL trunk.miod2014-07-112-2/+2
| | | | (be sure to make cleandir and make includes before building)
* More memory leaks and unchecked allocations; OpenSSL PR #3403 via OpenSSLmiod2014-07-118-14/+38
| | | | trunk. (note we had already fixed some of the issues in that PR independently)
* Fix incorrect duplicate mlinksbeck2014-07-111-8/+1
| | | | ok bcook@
* Make sure BN_sqr never returns negative numbers.miod2014-07-112-2/+4
| | | | OpenSSL PR #3400 via OpenSSL trunk.
* Accept CCS again after `finished' has been sent by the client; at this pointmiod2014-07-112-10/+12
| | | | | | | keys have been correctly set up so it is ok to accept CCS from the server. Without renegotiation can sometimes fail. OpenSSL PR #3400 via OpenSSL trunk.
* Correct incorrect mlinksbeck2014-07-111-5/+1
| | | | ok bcook@
* In dtls1_clear_queues(), free buffered_add_data.q correctly, it's made ofmiod2014-07-112-8/+8
| | | | | | DTLS1_RECORD_DATA, not hm_fragment. OpenSSL PR #3286 via OpenSSL trunk.
* Fix incorrect mlinksbeck2014-07-111-3/+1
| | | | ok bcook@
* Fix version number processing in cms_sd_set_version(); OpenSSL PR #3249 viamiod2014-07-112-6/+6
| | | | OpenSSL trunk.
* Remove duplicate 0x for salt len in output; Martin Kaiser via OpenSSL trunk.miod2014-07-112-4/+4
|
* When looking for the issuer of a certificate, if the current candidate ismiod2014-07-116-26/+194
| | | | | | | expired or not valid yet, continue looking; only return an expired certificate if no valid certificates have been found. OpenSSL PR #3359 via OpenSSL trunk.
* In ssl3_get_client_key_exchange() parsing a GOST session key, invoke themiod2014-07-112-26/+16
| | | | | regular ASN.1 parser rather than trying to handroll one and potentially misbehave; OpenSSL PR #3335 via OpenSSL trunk.
* Missing calloc() return value check in dgram_sctp_ctrl(); from Kurt Roeckx viamiod2014-07-112-22/+42
| | | | OpenSSL trunk
* Make CMS_decrypt_set1_pkey() return an error if no recipient type matches,miod2014-07-112-6/+8
| | | | instead of returning a random key; OpenSSL PR #3348 via OpenSSL trunk
* Missing initialization for error line in error paths; from Coverity viamiod2014-07-112-2/+8
| | | | OpenSSL trunk.
* Missing initialization; OpenSSL PR#3289 and #3345 via OpenSSL trunk.miod2014-07-112-4/+6
|
* Provide correct version details for LibreSSL.jsing2014-07-112-154/+6
| | | | ok beck@ deraadt@ miod@
* Clean up versioning and remove #ifdefs that we do not define.jsing2014-07-112-68/+18
| | | | ok beck@
* Make sure we leave OPENSSL_NO_PSK in the conf files so thingsbeck2014-07-1126-0/+26
| | | | | can know... ok jsing@
* Suspicions confirmed by sthen's searching that nothing uses ossl_ssize_tderaadt2014-07-111-3/+1
| | | | except embedded openssl's in other trees.
* Remove PSK from the ssl regress.jsing2014-07-112-134/+1
|
* pour some water on an ass emberderaadt2014-07-112-2/+2
| | | | spotted by doctor jsing, always keeping an eye out for these
* Fetch the specific license which will be used fromderaadt2014-07-112-0/+48
| | | | | | https://www.openssl.org/~appro/camellia/dist/BSD_license.txt It isn't our concern to supply the other licences mentioned in source files; that is realy not our problem.