summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Expand)AuthorAgeFilesLines
* Avoid an undefined shift in ASN1_INTEGER_get().tb2019-04-281-4/+8
* Use calloc/freezero when allocating and freeing the session ticket data.jsing2019-04-251-4/+6
* Use EVP_CIPHER_CTX_{new,free}() and HMAC_CTX_{new,free}() instead ofjsing2019-04-251-24/+29
* Rename some variables in tls_decrypt_ticket().jsing2019-04-251-18/+18
* Do not check for working go executable during make clean cleandir obj.bluhm2019-04-241-1/+3
* Do not check for working go executable during make clean cleandir obj.bluhm2019-04-241-1/+3
* Convert tls_decrypt_ticket() to CBS.jsing2019-04-231-44/+72
* Add error checking to i2v_POLICY_MAPPINGS().tb2019-04-221-9/+26
* Add error checking to i2v_POLICY_CONSTRAINTS().tb2019-04-221-5/+19
* Add error checking to i2v_EXTENDED_KEY_USAGE().tb2019-04-221-8/+23
* Add error checking to i2v_ASN1_BIT_STRING().tb2019-04-221-4/+18
* Add error checking to i2v_BASIC_CONSTRAINTS().tb2019-04-221-3/+18
* Add error checking to i2v_AUTHORITY_INFO_ACCESS(). While there, replacetb2019-04-221-19/+27
* Avoid potential double frees in i2v_AUTHORITY_KEYID(), i2v_GENERAL_NAME()tb2019-04-222-6/+22
* Provide a derr label (decode/decrypt error) in tls1_decrypt_ticket().jsing2019-04-221-41/+29
* Pass the session ID down to the session/ticket handling code as a CBS.jsing2019-04-224-35/+36
* Inline and remove the tlsext_tick_md macro.jsing2019-04-223-6/+5
* Add error checking to i2v_AUTHORITY_KEYID(), i2v_GENERAL_NAME()tb2019-04-212-32/+80
* The noop v2i_PKEY_USAGE_PERIOD() has been commented out since becktb2019-04-211-14/+2
* Fix awful whitespace in OBJ_bsearch_ext()tb2019-04-211-5/+6
* KNF: use proper wrapping of function return type and nametb2019-04-213-9/+9
* Clean up tls1_process_ticket().jsing2019-04-211-39/+43
* Cleanup more of tls_decrypt_ticket().jsing2019-04-211-5/+9
* Start cleaning up tls_decrypt_ticket().jsing2019-04-211-58/+63
* fix some style nits to reduce noise in an upcoming difftb2019-04-211-9/+8
* Avoid undefined behaviour that results from negating a signed long withjsing2019-04-201-2/+2
* Allocate md_data with calloc to avoid use of uninitialised memory.jsing2019-04-191-6/+6
* Allocate fixed NIDs for SM3/SM4.jsing2019-04-191-0/+12
* Rewrite & fix X509V3_add_value()tb2019-04-161-17/+24
* indent err: labelstb2019-04-161-7/+7
* wrap an overlong line and kill a space before a tabtb2019-04-161-3/+4
* Move function types to their own lines; rewrap.tb2019-04-161-30/+40
* Avoid signed integer overflow.jsing2019-04-151-2/+2
* Add input validation to BIO_read()/BIO_write().jsing2019-04-141-4/+14
* Some more malloc() to calloc() conversions.jsing2019-04-141-7/+5
* Remove two pointless chunks of code.jsing2019-04-141-16/+1
* Use calloc() when allocating cipher_data.jsing2019-04-141-5/+5
* Annotate a future improvement.jsing2019-04-141-1/+2
* Avoid potential double-frees following EVP_CIPHER_CTX_copy().jsing2019-04-141-4/+17
* Fix previous: I forgot to rename the bn_to_string() prototype.tb2019-04-141-2/+2
* Add a test for the bn_to_string() function introduced in v3_utl.c r1.32.tb2019-04-132-6/+133
* Null out pointers on asprintf() failure.tb2019-04-131-3/+7
* Avoid quadratic behavior of decimal BIGNUM conversiontb2019-04-131-9/+36
* Avoid leak in SSL_dup_CA_list()tb2019-04-131-8/+14
* Avoid an overread caused by d2i_PrivateKey().jsing2019-04-101-1/+3
* Recommend SSL_CTX_add1_chain_cert(3) rather thanschwarze2019-04-091-12/+11
* Document SSL_CTX_clear_mode(3) and SSL_clear_mode(3).schwarze2019-04-091-22/+48
* exitting -> exitingtb2019-04-071-1/+1
* Revert tasn_prn.c r1.18.jsing2019-04-071-6/+2
* whitespace consistencytb2019-04-051-1/+2