Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | BUF_MEM_grow_clean() takes a size_t as the size argument. Remove false comments | 2014-05-31 | 1 | -1/+1 | ||
| | | | | | | | mentioning it's an int, bogus (int) casts and bounds checks against INT_MAX (BUF_MEM_grow_clean has its own integer bounds checks). ok deraadt@ | |||||
* | remove some #if 0 code. we don't need any more reminders that we're using | 2014-05-30 | 1 | -49/+0 | ||
| | | | | a not quite appropriate data structure. ok jsing | |||||
* | There is no point in checking if a pointer is non-NULL before calling free, | 2014-05-28 | 1 | -6/+3 | ||
| | | | | | | | | since free already does this for us. Also remove some pointless NULL assignments, where the result from malloc(3) is immediately assigned to the same variable. ok miod@ | |||||
* | Stop pulling pqueue.h into ssl_locl.h since only a small part of libssl | 2014-05-22 | 1 | -0/+2 | ||
| | | | | | | | | | | actually needs it. Instead, just include it in the files where it is actually necessary. Also remove standard includes from pqueue.h so that they are not available as a side effect. Just add the two includes that are needed to pqueue.c. ok miod@ | |||||
* | In dtls1_reassemble_fragment() and dtls1_process_out_of_seq_message(), in case | 2014-05-18 | 1 | -7/+3 | ||
| | | | | | | | | of error, make sure we do not free pitem which is still linked into the pqueue. In the same vain, only free `frag' if we allocated it in this function. Help and ok beck@ | |||||
* | Avoid a potential null pointer dereference by checking that we actually | 2014-04-30 | 1 | -0/+2 | ||
| | | | | | | managed to allocate a fragment, before trying to memcpy data into it. ok miod@ | |||||
* | More KNF. | 2014-04-24 | 1 | -92/+122 | ||
| | ||||||
* | more malloc/realloc/calloc cleanups; ok beck kettenis | 2014-04-21 | 1 | -3/+3 | ||
| | ||||||
* | Change library to use intrinsic memory allocation functions instead of | 2014-04-17 | 1 | -12/+12 | ||
| | | | | | | | | OPENSSL_foo wrappers. This changes: OPENSSL_malloc->malloc OPENSSL_free->free OPENSSL_relloc->realloc OPENSSL_freeFunc->free | |||||
* | fix a few bugs observed on http://www.viva64.com/en/b/0250/ | 2014-04-16 | 1 | -1/+0 | ||
| | | | | ok krw miod | |||||
* | correct cases of code occuring directly after goto/break/return | 2014-04-15 | 1 | -1/+1 | ||
| | | | | ok miod@ guenther@ | |||||
* | make OPENSSL_NO_HEARTBLEED the default and only option. ok deraadt miod | 2014-04-14 | 1 | -153/+0 | ||
| | ||||||
* | First pass at applying KNF to the OpenSSL code, which almost makes it | 2014-04-14 | 1 | -565/+501 | ||
| | | | | | readable. This pass is whitespace only and can readily be verified using tr and md5. | |||||
* | Flense a variety of windows support stuff, and a strange gettimeofday function. | 2014-04-13 | 1 | -7/+0 | ||
| | | | | ok deraadt@ | |||||
* | Merge conflicts; remove MacOS, Netware, OS/2, VMS and Windows build machinery. | 2014-04-13 | 1 | -4/+4 | ||
| | ||||||
* | cherrypick fix for CVE-2014-0160 "heartbleed" vulnerability from | 2014-04-07 | 1 | -8/+18 | ||
| | | | | OpenSSL git; ok sthen@ | |||||
* | SECURITY fixes backported from openssl-1.0.1f. ok mikeb@ | 2014-02-27 | 1 | -0/+7 | ||
| | | | | | | | | | | | | CVE-2013-4353 NULL pointer dereference with crafted Next Protocol Negotiation record in TLS handshake. Upstream: 197e0ea CVE-2013-6449 Fix crash with crafted traffic from a TLS 1.2 client. Upstream: ca98926, 0294b2b CVE-2013-6450 Fix DTLS retransmission from previous session. Upstream: 3462896 | |||||
* | import OpenSSL-1.0.1c | 2012-10-13 | 1 | -3/+175 | ||
| | ||||||
* | OpenSSL 1.0.0f: import upstream source | 2012-01-05 | 1 | -7/+16 | ||
| | ||||||
* | import OpenSSL 1.0.0e | 2011-11-03 | 1 | -18/+10 | ||
| | ||||||
* | import OpenSSL-1.0.0a | 2010-10-01 | 1 | -201/+426 | ||
| | ||||||
* | import of OpenSSL 0.9.8h | 2008-09-06 | 1 | -0/+1193 | ||