summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Expand)AuthorAgeFilesLines
* Convert openssl(1) sess_id to the new option handling.doug2015-01-241-88/+113
* Convert openssl(1)'s rsa.c to the new option handling code.doug2015-01-241-184/+251
* Ensure that a ServerKeyExchange message is received if the selected cipherjsing2015-01-232-10/+36
* Use field names in struct initialisers.jsing2015-01-226-66/+66
* last entry in NAME should not have a trailing comma;jmc2015-01-221-2/+2
* Add MLINK for tls_config_set_ca_mem()reyk2015-01-221-1/+2
* Allow to to load the CA chain directly from memory instead ofreyk2015-01-226-8/+39
* Support CA verification in chroot'ed processes without direct filereyk2015-01-226-6/+20
* Add X509_STORE_load_mem() to load certificates from a memory bufferreyk2015-01-229-8/+338
* Make it obvious which openssl test complained and whether it was expected.doug2015-01-221-2/+5
* Assume that the size of a pointer will not change at runtime.bcook2015-01-222-56/+30
* Fix DTLS memory leak (CVE-2015-0206).libressl-v2.1.3doug2015-01-212-18/+46
* Missing $OpenBSD$'s.krw2015-01-205-0/+5
* Add arc4random/getentropy shims for NetBSD.bcook2015-01-194-0/+300
* Improve wording in alloca.tedu2015-01-171-7/+5
* Use ">", not ">=" when comparing length to HOST_NAME_MAX sincemillert2015-01-161-3/+3
* Replace HOST_NAME_MAX+1-1 with HOST_NAME_MAX. OK deraad@millert2015-01-162-8/+8
* Replace check for ">= HOST_NAME_MAX+1" with "> HOST_NAME_MAX".millert2015-01-161-1/+1
* Move to the <limits.h> universe.deraadt2015-01-1623-57/+40
* The SSL/TLS session Id context is limited to 32 bytes. Instead ofreyk2015-01-161-1/+13
* Delete the MANLINT variable and the related SUFFIXES rules becauseschwarze2015-01-162-4/+4
* remove unused variablechl2015-01-151-2/+1
* back in september I did the large abstraction refactoring to allow thesederaadt2015-01-1514-14/+28
* Make strlcpy/strlcat slightly easier to read.millert2015-01-154-86/+82
* For non-blocking sockets tls_connect_fds() could fail with EAGAIN.bluhm2015-01-132-7/+22
* Document the openssl s_client -proxy feature.bluhm2015-01-131-2/+14
* Add the possibility to use the openssl s_client tool with an httpbluhm2015-01-131-4/+24
* Implement more thorough error checks:lteo2015-01-131-12/+38
* rename blocks to words. bcrypt "blocks" are unrelated to blowfish blocks,tedu2015-01-121-9/+9
* Fix a memory leak in bss_dgram.doug2015-01-122-6/+26
* Convert spkac.c to the new option handling code.doug2015-01-081-100/+137
* Convert pkcs8.c to the new option handling code.doug2015-01-081-157/+220
* Convert asn1pars.c to the new option handling.doug2015-01-081-137/+206
* missing , found by Dongsheng Songderaadt2015-01-081-3/+3
* Avoid a double-free in an error path.doug2015-01-082-2/+4
* stupid me. need errno.htedu2015-01-071-1/+2
* set errno = EINVAL for invalid salts and hashes in most functions.tedu2015-01-071-12/+20
* mix in more virtual memory and process informationbcook2015-01-072-4/+8
* add initial HP-UX getentropy/arc4random support.bcook2015-01-064-0/+992
* rename kern enter/exit macros to malloc enter/leave to better reflecttedu2015-01-051-7/+7
* Convert openssl(1) passwd to new option handling.jsing2015-01-051-119/+151
* convert clock() to clock_gettime() for improved precision (and accuracy?)tedu2015-01-051-7/+9
* Zap a reference to .rnd, which is likely the last RANDFILE remnant onlteo2015-01-051-3/+2
* Fix incorrect OPENSSL_assert() usage.doug2015-01-032-48/+106
* Check the return values of several reallocarray() calls. While here,lteo2015-01-033-3/+17
* Rename the tls_connect_socket() parameter 'socket' to 's' to avoidbluhm2015-01-021-4/+4
* Remove ifdef statements for TIMES and USE_TOD; they don't do anything,lteo2015-01-021-5/+1
* Provide option types for binary AND, binary OR and silently discarding anjsing2015-01-012-2/+13
* Convert the openssl(1) enc command to the new option parsing and usage.jsing2015-01-011-250/+382
* Revert previous; tls_accept_socket() was intentionally undocumentedschwarze2015-01-011-7/+1