summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Expand)AuthorAgeFilesLines
* While slick, this isn't accessing multiple directories concurrently, soguenther2015-02-221-29/+35
* Bump libcrypto and libssl majors, due to various recent churn.jsing2015-02-224-4/+4
* Reluctantly add server-side support for TLS_FALLBACK_SCSV.jsing2015-02-2215-25/+159
* There is not much point constructing an SSL_CIPHER, then callingjsing2015-02-222-14/+6
* Remove IMPLEMENT_STACK_OF noops.jsing2015-02-224-8/+4
* Update for recent verify related naming changes.jsing2015-02-222-28/+28
* Bump libtls major due to symbol removal.jsing2015-02-221-3/+2
* Rename tls_config_insecure_noverifyhost() tojsing2015-02-224-21/+20
* Check return values when setting dheparams and ecdhecurve for the defaultjsing2015-02-221-11/+14
* In the interests of being secure by default, make the default TLS ciphersjsing2015-02-222-2/+17
* explain how tls_accept_socket works.tedu2015-02-211-2/+9
* tls_config_set_protocols is really void. Greg Martin.tedu2015-02-211-3/+3
* fill out docs a bit more, notably the read/write again behaviors.tedu2015-02-211-3/+27
* If BN_rand() or BN_pseudo_rand() are called with a NULL rnd argument,jsing2015-02-192-6/+16
* BN_free() has its own NULL check.jsing2015-02-191-14/+7
* KNF.jsing2015-02-191-766/+834
* fix coverity 105350 and 10345beck2015-02-181-1/+2
* Memory leak in error path. Coverity CID 78822.miod2015-02-172-16/+18
* Amend documentation for AI_ADDRCONFIGjca2015-02-161-2/+4
* third batch of perlpod(1) to mdoc(7) conversionschwarze2015-02-1625-1367/+2121
* Add more error checking and free resources in bytestringtest.doug2015-02-161-26/+47
* Avoid calling BN_CTX_end() on a context that wasn't started.doug2015-02-152-8/+8
* Use "In" to mark up include files, instead of wrongly wrapping with Aq.bentley2015-02-151-3/+3
* Regenmiod2015-02-156-528/+564
* s/tls_load_keys/tls_load_file/jsing2015-02-151-2/+2
* Document tls_config_parse_protocols() and update documentation forjsing2015-02-152-5/+27
* Fix various memory leaks by not exiting so abruptly from failed tests.miod2015-02-151-579/+507
* Remove ancient gcc workaround on mips.miod2015-02-151-3/+2
* Memory leak. Coverity CID 78865miod2015-02-151-2/+3
* Wrong logic; Coverity CID 78894miod2015-02-151-1/+1
* If we decide to discard the provided seed buffer because its size is notmiod2015-02-152-16/+12
* Check ASN1_OCTET_STRING_new() for failure. Coverity CID 78904miod2015-02-152-12/+16
* In ec_wNAF_mul(), move the declaration of tmp_wNAF higher in scope, so thatmiod2015-02-152-12/+10
* lsearch and lfind return void *tedu2015-02-151-4/+4
* Support for nc -T on IPv6 addresses.jca2015-02-141-7/+16
* Remove asn1_ex_i2c() prototype, now that this function has been made static;miod2015-02-142-4/+2
* Words read better when they are separated by spaces.miod2015-02-142-2/+2
* 1.18 would introduce a possible out-of-bounds access in the error path;miod2015-02-142-14/+10
* Remove DEBUG_PKCS5V2 code.miod2015-02-142-50/+2
* Unchecked allocations in x509_name_canon().miod2015-02-142-2/+10
* Memory leak upon error in X509_add1_{trust,reject}_object.miod2015-02-142-14/+46
* Manually expand IMPLEMENT_EXTERN_ASN1 macro (the only occurence in crypto).jsing2015-02-142-6/+20
* Remove IMPLEMENT_COMPAT_ASN1() and related support code. Nothing uses it inmiod2015-02-1410-282/+14
* Make asn1_ex_i2c() static. ok jsing@miod2015-02-142-4/+8
* Memory leak in `should not happen' condition; Coverity CID 78889.miod2015-02-142-8/+8
* Memory leak upon error; Coverity CID 78857miod2015-02-142-2/+8
* Check i2d_name_canon() for failure (negative return). Coverity CID 78888.miod2015-02-142-12/+16
* Possible NULL pointer dereferences. Coverity CID 21719, 21732.miod2015-02-144-6/+14
* Potential NULL dereference in the error path; Coverity CID 21720miod2015-02-142-4/+4
* Coverity CID 21733 (unchecked allocation), 78823 (leak on error).miod2015-02-142-2/+12