summaryrefslogtreecommitdiffstats
path: root/lib/libssl/src (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Manually expand ASN1_ITEM_rptr macros that should have been expanded withjsing2015-02-1010-29/+29
* Expand the -IMPLEMENT_ASN1_ENCODE_FUNCTIONS_(const_)?fname macros so thatjsing2015-02-104-13/+121
* Expand the IMPLEMENT_ASN1_DUP_FUNCTION macro so that the code is visiblejsing2015-02-1010-29/+124
* Expand the IMPLEMENT_ASN1_FUNCTIONS_{const,fname,name} macros so that thejsing2015-02-105-23/+455
* Expand the IMPLEMENT_ASN1_FUNCTIONS macro so that the code is visible andjsing2015-02-096-51/+1155
* Expand the IMPLEMENT_ASN1_FUNCTIONS macro so that the code is visible andjsing2015-02-0912-43/+787
* BN_CTX_get() can fail - consistently check its return value.jsing2015-02-0928-273/+358
* Expand the IMPLEMENT_ASN1_FUNCTIONS macro so that the code is visible andjsing2015-02-0919-60/+1044
* Jettison SCTP support in BIO dgram.jsing2015-02-092-1052/+2
* Jettison DTLS over SCTP.jsing2015-02-097-409/+7
* Return NULL when there are no shared ciphers.doug2015-02-091-4/+6
* This is neither code not proper documentation.miod2015-02-097-157/+0
* Remove unused GOST test that prevents clang from building libcrypto.doug2015-02-091-55/+1
* Use `> 0' instead of `!= 0' as a successful condition formiod2015-02-0810-44/+44
* Move a few typedef up in this file in order to be able to use them in env_md_stmiod2015-02-081-14/+10
* Check memory allocation results in EVP_PBE_alg_add_type().miod2015-02-081-3/+10
* Check memory allocation results, as well as stack pushes.miod2015-02-081-9/+34
* Rely upon enc_flags rather than the tls version, to upgrade SHA1+MD5 tomiod2015-02-081-4/+4
* Lob a KNF grenade into the ecdsa code.jsing2015-02-088-312/+288
* Don't leak addresses in error messages.miod2015-02-071-2/+2
* Remove useless variables and use the values directly.doug2015-02-071-5/+3
* Don't support very old versions of Netscape (is there any other kind?).doug2015-02-071-6/+5
* Delete a lot of #if 0 code in libressl.doug2015-02-0745-673/+55
* Convert several of the server side handshake functions to the new handshakejsing2015-02-072-119/+54
* Don't allow tag number 31 in CBB_add_asn1().doug2015-02-072-12/+27
* Clean up the {get,put}_cipher_by_char() implementations. Also usejsing2015-02-073-30/+14
* Only call free in CBB_init().doug2015-02-071-3/+6
* Provide a SSL_CIPHER_get_by_value() function that allows a cipher to bejsing2015-02-074-4/+33
* Combine c_allc.c and c_alld.c into c_all.c - there is not much point havingjsing2015-02-073-361/+230
* Fix typo and ASN.1 tag number range comment in bytestring.h.doug2015-02-071-4/+4
* KNF bytestring files.doug2015-02-064-908/+1096
* Remove accidental, commented out code.doug2015-02-061-11/+1
* Unifdef NETSCAPE_HANG_BUG.jsing2015-02-061-22/+1
* Add additional checks to ssl3_send_client_key_exchange() that ensuresjsing2015-02-061-18/+25
* Import BoringSSL's crypto bytestring and crypto bytebuilder APIs.doug2015-02-064-0/+1343
* Bring back the horrible API that is get_cipher_by_char/put_cipher_by_char.jsing2015-02-0615-16/+91
* Rename SSL_CTX_use_certificate_chain() to SSL_CTX_use_certificate_chain_mem().reyk2015-02-063-9/+9
* Declare the x509_(mem|file|dir)_lookup symbols as static because theyreyk2015-02-053-6/+6
* Fix a number of issues relating to algorithms in signatures, Mostlybeck2015-01-287-9/+58
* Place the remainder of e_os2.h under #ifndef LIBRESSL_INTERNAL until we canjsing2015-01-261-1/+5
* Add AEAD as a "MAC alias" so that it is possible to identify/select ciphersjsing2015-01-262-2/+7
* Ensure that a ServerKeyExchange message is received if the selected cipherjsing2015-01-231-5/+18
* Use field names in struct initialisers.jsing2015-01-223-33/+33
* Support CA verification in chroot'ed processes without direct filereyk2015-01-222-2/+9
* Add X509_STORE_load_mem() to load certificates from a memory bufferreyk2015-01-223-2/+167
* Assume that the size of a pointer will not change at runtime.bcook2015-01-221-28/+15
* Fix DTLS memory leak (CVE-2015-0206).doug2015-01-211-9/+23
* Fix a memory leak in bss_dgram.doug2015-01-121-3/+13
* Avoid a double-free in an error path.doug2015-01-081-1/+2
* Fix incorrect OPENSSL_assert() usage.doug2015-01-031-24/+53