summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Fix two theoretical NULL pointer dereferences which can only happen if youmiod2015-07-152-8/+18
* Fix possible 32 byte buffer overrun, found by coverity, CID 78869beck2015-07-152-4/+4
* Memory leak; Coverity CID 78836miod2015-07-152-12/+16
* Unchecked allocations, and make sure we do not leak upon error. Fixesmiod2015-07-152-42/+72
* Avoid leaking objects upon error; tweaks & ok doug@miod2015-07-152-36/+36
* Do not allow TS_check_signer_name() with signer == NULL frommiod2015-07-152-2/+8
* Previous fix for Coverity CID 21785 did not cope correctly with seed_len != 0,miod2015-07-152-2/+6
* Add OPTION_ARG_LONG for handling of options with a long type.jsing2015-07-152-3/+16
* Make 'openssl pkeyutl -verify' return exit code 0 on success.bcook2015-07-151-4/+5
* Partially convert ssl3_get_message to CBS.doug2015-07-142-12/+30
* Convert dtls1_get_hello_verify to CBS.doug2015-07-142-34/+46
* Convert ssl3_get_cipher_by_char to CBS.doug2015-07-142-4/+16
* Convert ssl3_get_client_certificate to CBS.doug2015-07-142-30/+38
* Convert ssl3_get_finished to CBS.doug2015-07-142-12/+18
* Convert ssl_parse_clienthello_use_srtp_ext to CBS.doug2015-07-144-84/+50
* Convert ssl3_get_cert_status to CBS.doug2015-07-142-34/+52
* Convert ssl3_get_server_certificate to CBS.doug2015-07-142-34/+36
* Unhook tls_ext_alpn test until the code passes it.doug2015-07-131-2/+5
* Convert openssl(1) dh to the new option handling.doug2015-07-121-98/+111
* Convert openssl(1) dsa to the new option handling.doug2015-07-121-154/+208
* Convert openssl(1) ec to the new option handling.doug2015-07-121-170/+247
* Convert gendh.c to the new option handling.doug2015-07-121-54/+79
* Convert openssl(1) dsaparam to the new option handling.doug2015-07-121-154/+123
* Convert openssl(1) crl2pkcs7 to the new option handling.doug2015-07-121-95/+110
* Convert openssl(1) dhparam to new option handling.jsing2015-07-111-121/+160
* Add tests for parsing TLS extension ALPN (RFC 7301).doug2015-07-092-2/+446
* switch "openssl dhparam" default from 512 to 2048 bits, ok jsing@sthen2015-07-082-6/+6
* add setlocale testsemarie2015-07-071-1/+3
* add regress test for setlocale(3) and some relatedsemarie2015-07-072-0/+140
* Repair algorithm name array after 1.6.miod2015-07-031-4/+4
* specify the array initializer valuelibressl-v2.2.1bcook2015-07-011-2/+2
* fix the build on arm after the recent addition of -Wundefjsg2015-06-292-4/+4
* Convert ssl_bytes_to_cipher_list to CBS.doug2015-06-286-23/+59
* Add unit tests for LibreSSL.doug2015-06-273-0/+256
* Fix pointer to unsigned long conversion.doug2015-06-274-10/+14
* Put BUF_memdup() and BUF_reverse() under #ifndef LIBRESSL_INTERNAL.jsing2015-06-242-6/+4
* Stop using BUF_memdup() within the LibreSSL code base - it is correctlyjsing2015-06-244-12/+14
* Change CBS_dup() to also sync the offset.doug2015-06-233-3/+41
* Convert bytestringtest to individual checks and don't short circuit.doug2015-06-231-321/+337
* Remove unnecessary regress target.doug2015-06-231-7/+2
* Check for failure with CBB_init() in bs_ber.c.doug2015-06-212-4/+6
* Just return if nmemb is 0. Avoids a NULL dereference and ismillert2015-06-211-1/+4
* Convert ssl3_get_new_session_ticket to CBS.doug2015-06-202-48/+48
* Convert ssl3_get_next_proto to CBS.doug2015-06-202-28/+38
* Convert ssl_parse_serverhello_renegotiate_ext to CBS.doug2015-06-204-38/+42
* Handle NIST curve names in openssl(1) ecparam.jsing2015-06-201-1/+4
* Handle NIST curve names.jsing2015-06-202-4/+8
* Have ECPKParameters_print() include the NIST curve name, if known.jsing2015-06-202-2/+20
* Less mdc2.jsing2015-06-201-4/+1
* Provide EC_curve_nid2nist() and EC_curve_nist2nid().jsing2015-06-204-4/+114